Login / Signup

Provable security for 13 round Skipjack-like structure.

Seokhie HongJaechul SungSangjin LeeJongin LimJongsu Kim
Published in: Inf. Process. Lett. (2002)
Keyphrases
  • network security
  • database
  • databases
  • access control
  • data mining
  • learning algorithm
  • intrusion detection
  • tree structure
  • information security
  • security policies
  • security management