On the Security of UOV.
Jean-Charles FaugèreLudovic PerretPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- information security
- computer security
- network security
- statistical databases
- security protocols
- security issues
- security threats
- security problems
- security level
- security policies
- data integrity
- security mechanisms
- network management
- information systems
- security model
- data security
- security systems
- security management
- functional requirements
- security analysis
- key management
- database
- security requirements
- network traffic
- access control
- data management
- low cost
- data mining