Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.
Michel AbdallaFabrice BenhamoudaAlain PasselègueKenneth G. PatersonPublished in: J. Cryptol. (2018)
Keyphrases
- pseudorandom
- random number
- secret key
- private key
- stream cipher
- high security
- encryption algorithm
- information security
- uniformly distributed
- intrusion detection
- secure communication
- wireless sensor networks
- neural network
- security issues
- basis functions
- security mechanisms
- security protocols
- access control
- real time