A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Hemanta K. MajiManoj PrabhakaranMike RosulekPublished in: CRYPTO (2010)
Keyphrases
- security properties
- security protocols
- complexity analysis
- key management
- encryption scheme
- random number generator
- information security
- security requirements
- stream cipher
- network security
- intrusion detection
- space complexity
- cryptographic protocols
- decision problems
- worst case
- high assurance
- security issues
- security policies
- computer security
- legal reasoning
- smart card
- case law
- cryptographic algorithms
- fuzzy vault