Post-quantum security of the sponge construction.
Jan CzajkowskiLeon Groot BruinderinkAndreas HülsingChristian SchaffnerDominique UnruhPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- access control
- intrusion detection
- information assurance
- security management
- information security
- security policies
- computer security
- security measures
- security threats
- data security
- security protocols
- security mechanisms
- security requirements
- security properties
- security issues
- neural network
- security vulnerabilities
- quantum inspired
- databases
- real time
- encryption scheme
- construction process
- security systems
- genetic algorithm