Security of Truncated Permutation Without Initial Value.
Lorenzo GrassiBart MenninkPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- access control
- information security
- intrusion detection
- security issues
- statistical databases
- network security
- security policies
- security requirements
- security mechanisms
- security problems
- security management
- computer security
- security systems
- security analysis
- high security
- data mining
- information assurance
- security level
- authentication protocol
- security protocols
- risk assessment
- data management