Circular Security Counterexamples for Arbitrary Length Cycles from LWE.
Venkata KoppulaBrent WatersPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- arbitrary length
- information security
- security issues
- intrusion detection
- information assurance
- b tree
- security problems
- statistical databases
- security threats
- network security
- security requirements
- bit strings
- security management
- functional requirements
- security policies
- high dimensional
- rfid tags
- security mechanisms
- computer security
- smart card
- relational databases
- data structure
- harmonic functions
- similarity measure