Two-Round Man-in-the-Middle Security from LPN.
David CashEike KiltzStefano TessaroPublished in: TCC (A1) (2016)
Keyphrases
- access control
- information security
- intrusion detection
- statistical databases
- security issues
- security requirements
- security measures
- security policies
- information systems
- key management
- block cipher
- security problems
- cyber attacks
- standard model
- information assurance
- security model
- security properties
- high security
- data sets
- security analysis
- security mechanisms
- encryption scheme
- countermeasures
- lightweight
- low cost
- mobile devices
- web services
- neural network