Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security.
Shweta AgrawalSimran KumariRyo NishimakiPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- information security
- encryption algorithms
- security requirements
- information assurance
- cellular automata
- access control
- security issues
- security management
- intrusion detection
- security policies
- security problems
- security mechanisms
- public key cryptography
- network security
- statistical databases
- elliptic curve cryptography
- data security
- cryptographic algorithms
- security threats
- security systems
- computer security
- encryption scheme
- smart card
- security vulnerabilities
- high security
- security protocols
- image encryption
- security services
- security properties
- standard model
- cyber security
- data sets
- sensitive data
- rfid tags
- information systems