Revisiting the Concrete Security of Goldreich's Pseudorandom Generator.
Jing YangQian GuoThomas JohanssonMichael LentmaierPublished in: IEEE Trans. Inf. Theory (2022)
Keyphrases
- pseudorandom
- encryption algorithm
- stream cipher
- secret key
- random number
- uniformly distributed
- random numbers
- security level
- key management
- information security
- access control
- security issues
- high security
- authentication scheme
- encryption scheme
- security problems
- authentication protocol
- security requirements
- intrusion detection
- security analysis
- real time
- security systems
- security policies
- network security
- security threats
- computer security
- security management
- elliptic curve
- functional requirements
- statistical databases
- neural network