Concrete Security Against Adversaries with Quantum Superposition Access to Encryption and Decryption Oracles.
Shahram MossayebiRüdiger SchackPublished in: CoRR (2016)
Keyphrases
- access control
- security policies
- access requests
- information security
- security mechanisms
- sys tems
- situational awareness
- data security
- intrusion detection
- security issues
- security requirements
- role based access control
- security systems
- windows xp
- security threats
- computer security
- statistical databases
- security measures
- unauthorized access
- network access
- evolutionary algorithm
- database systems
- security protocols
- security level
- security problems
- read write
- quantum inspired
- theorem proving
- test cases
- privacy enhancing
- principles of quantum computing