Login / Signup
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Fuchun Guo
Rongmao Chen
Willy Susilo
Jianchang Lai
Guomin Yang
Yi Mu
Published in:
CRYPTO (2) (2017)
Keyphrases
</>
information security
dynamic programming
security issues
optimal solution
worst case
model checking
security requirements
intrusion detection
security mechanisms
security analysis
data sets
network security
functional requirements
security properties
security measures