GCM Security Bounds Reconsidered.
Yuichi NiwaKeisuke OhashiKazuhiko MinematsuTetsu IwataPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- information security
- lower bound
- upper bound
- information assurance
- access control
- security issues
- security requirements
- computer security
- security systems
- worst case
- security level
- intrusion detection
- security problems
- network security
- security policies
- database systems
- cyber security
- statistical databases
- error bounds
- security threats
- security measures
- real time