An OAEP Variant With a Tight Security Proof.
Jakob JonssonPublished in: IACR Cryptol. ePrint Arch. (2002)
Keyphrases
- lower bound
- upper bound
- information security
- access control
- worst case
- security issues
- security requirements
- statistical databases
- network security
- security threats
- security policies
- computer security
- data sets
- theorem proving
- security management
- security properties
- security problems
- security vulnerabilities
- security measures
- database
- security systems
- encryption scheme
- biometric systems
- rfid tags
- theorem prover
- intrusion detection
- real time