A Converse to the Ajtai-Dwork Security Proof and its Cryptographic Implications
Phong Q. NguyenJacques SternPublished in: Electron. Colloquium Comput. Complex. (1998)
Keyphrases
- security protocols
- key management
- security properties
- smart card
- cryptographic protocols
- encryption scheme
- security requirements
- public key cryptography
- fuzzy vault
- encryption key
- information security
- encryption decryption
- intrusion detection
- security services
- cryptographic algorithms
- stream cipher
- security mechanisms
- secure communication
- random number generator
- security issues
- security policies
- high assurance
- security analysis
- security systems
- elliptic curve cryptography
- access control
- data security
- public key
- operating system
- security model
- secret key
- sensitive data
- theorem prover
- network security
- data mining
- public key encryption