The tightness of security reductions in code-based cryptography.
Nicolas SendrierPublished in: ITW (2011)
Keyphrases
- information security
- encryption algorithms
- security issues
- security requirements
- cellular automata
- source code
- countermeasures
- access control
- elliptic curve cryptography
- public key cryptography
- intrusion detection
- cryptographic protocols
- lower bound
- security level
- statistical databases
- cryptographic algorithms
- computer security
- security analysis
- security services
- security threats
- security properties
- elliptic curve
- network security
- user authentication
- high security
- security protocols
- static analysis
- public key
- sql injection