Login / Signup
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.
Shuai Han
Shengli Liu
Lin Lyu
Dawu Gu
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
information security
lower bound
security policies
upper bound
worst case
information leakage
information systems
security issues
canonical correlation analysis
security problems
nearest neighbor
smart card
network security
statistical databases
security model
security systems