KDM Security for the Fujisaki-Okamoto Transformations in the QROM.
Fuyuki KitagawaRyo NishimakiPublished in: Public Key Cryptography (2) (2022)
Keyphrases
- information security
- access control
- security issues
- intrusion detection
- security problems
- security systems
- security requirements
- network security
- information assurance
- security threats
- security level
- cyber security
- security protocols
- statistical databases
- security policies
- data sets
- real time
- computer security
- computer networks
- website
- decision making
- security properties
- security management
- database