On the Hardness of Proving CCA-security of Signed ElGamal.
David BernhardMarc FischlinBogdan WarinschiPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- intrusion detection
- security requirements
- access control
- canonical correlation analysis
- computational complexity
- security issues
- statistical databases
- information security
- network security
- phase transition
- database systems
- security systems
- security policies
- security analysis
- knn
- partial least squares
- computer security
- security model
- security management
- information assurance