Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security.
Benoît LibertKhoa NguyenAlain PasselègueRadu TitiuPublished in: ASIACRYPT (1) (2020)
Keyphrases
- security requirements
- simulation model
- security issues
- security policies
- information systems
- security analysis
- simulation models
- least squares
- access control
- information security
- canonical correlation analysis
- data sets
- functional requirements
- network security
- mathematical model
- intrusion detection
- multi agent systems
- feature selection
- neural network