Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.
Johannes ErlacherFlorian MendelMaria EichlsederPublished in: IACR Trans. Symmetric Cryptol. (2022)
Keyphrases
- information security
- lower bound
- upper bound
- intrusion detection
- computer security
- neural network
- access control
- network security
- security systems
- closed form
- key management
- upper and lower bounds
- genetic algorithm
- security requirements
- security issues
- security policies
- linear systems
- security mechanisms
- rfid tags
- data security
- scatter search
- block cipher
- security management
- information assurance