A note on the security of Higher-Order Threshold Implementations.
Oscar ReparazPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- higher order
- high order
- information security
- signcryption scheme
- security issues
- natural images
- low order
- markov random field
- pairwise
- access control
- intrusion detection
- data security
- key management
- security threats
- security properties
- security requirements
- security management
- security vulnerabilities
- information assurance
- network security
- statistical databases
- database
- efficient implementation
- conditional random fields
- information systems