Login / Signup
Verifying Solutions to LWE with Implications for Concrete Security.
Palash Sarkar
Subhadip Singha
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
information security
intrusion detection
data sets
computer security
security patterns
information assurance
genetic algorithm
network security
security policies
functional requirements
security protocols
security management