Login / Signup
Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security.
Benoît Libert
Khoa Nguyen
Alain Passelègue
Radu Titiu
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
data sets
security policies
simulation model
access control
information assurance
information systems
neural network
face recognition
feature extraction
network security
theorem proving
statistical databases
security requirements
canonical correlation analysis