On the CCA (in)security of MTProto.
Jakob JakobsenClaudio OrlandiPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- information security
- canonical correlation analysis
- security requirements
- network security
- security issues
- security threats
- statistical databases
- information assurance
- real time
- security management
- security systems
- security mechanisms
- functional requirements
- intrusion detection
- access control
- computer security
- security level
- high dimensional
- database systems
- neural network