Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation.
Mayuresh Vivekanand AnandEhsan Ebrahimi TarghiGelo Noel TabiaDominique UnruhPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- information security
- security issues
- access control
- computer security
- security threats
- network security
- functional requirements
- security requirements
- quantum computation
- information assurance
- security problems
- security systems
- security policies
- sensitive data
- security mechanisms
- security level
- intrusion detection
- security measures
- quantum computing
- web search
- rfid tags
- statistical databases
- data security
- security properties
- anomaly detection
- security vulnerabilities
- genetic algorithm