A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier.
Kan YasudaPublished in: EUROCRYPT (2009)
Keyphrases
- access control
- information security
- intrusion detection
- computer security
- network security
- security requirements
- information assurance
- security threats
- security systems
- security issues
- security policies
- database
- functional requirements
- statistical databases
- security problems
- security mechanisms
- key management
- critical infrastructure
- databases