Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
Rishab GoyalVenkata KoppulaBrent WatersPublished in: Public Key Cryptography (1) (2017)
Keyphrases
- high security
- network security
- secure communication
- access control
- hough transform
- data sets
- private key
- security systems
- computer security
- security requirements
- information security
- intrusion detection
- security issues
- security policies
- human operators
- key technologies
- security analysis
- security problems
- learning algorithm
- database