Estimating the Security of Lattice-based Cryptosystems.
Markus RückertMichael SchneiderPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- fuzzy vault
- elliptic curve
- cryptographic protocols
- private key
- information security
- access control
- intrusion detection
- key management
- public key
- smart card
- security properties
- key distribution
- network security
- secret key
- public key cryptosystems
- elliptic curve cryptography
- computer security
- security mechanisms
- security requirements
- rigid body
- security issues
- statistical databases
- standard model
- resource constrained
- secure communication
- high security
- security policies
- data mining