Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query.
Haodong JiangZhi MaZhenfeng ZhangPublished in: ASIACRYPT (4) (2023)
Keyphrases
- security threats
- security mechanisms
- database
- query processing
- computer security
- security risks
- response time
- security problems
- information security
- security issues
- security measures
- security protocols
- security breaches
- countermeasures
- user queries
- cyber attacks
- java card
- denial of service attacks
- malicious users
- security requirements
- inference control
- intrusion detection
- high security
- block cipher
- fault injection
- query expansion
- security vulnerabilities
- data sources
- network security
- least squares
- cryptographic protocols
- malicious attacks
- statistical databases
- relational databases
- biometric template
- relevance feedback
- database objects
- watermarking scheme