On Length Independent Security Bounds for the PMAC Family.
Bishwajit ChakrabortySoumya ChattopadhyayAshwin JhaMridul NandiPublished in: IACR Trans. Symmetric Cryptol. (2021)
Keyphrases
- access control
- security requirements
- intrusion detection
- lower bound
- upper bound
- information security
- security problems
- worst case
- computer security
- security management
- network security
- security policies
- statistical databases
- security issues
- tight bounds
- total length
- malware detection
- security level
- information assurance
- security systems
- neural network
- security mechanisms
- special case
- key management
- cyber security
- fixed length
- cryptographic protocols
- network management
- electronic commerce
- security threats
- learning algorithm
- data mining
- security vulnerabilities
- data sets