Quantum Security of the Fujisaki-Okamoto and OAEP Transforms.
Ehsan Ebrahimi TarghiDominique UnruhPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- intrusion detection
- information security
- security systems
- network security
- security requirements
- computer security
- information assurance
- access control
- security model
- quantum computation
- high security
- security threats
- security protocols
- key management
- functional requirements
- security level
- database systems
- security measures
- information systems
- security vulnerabilities
- social networks
- real time