Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
Akiko InoueTetsu IwataKazuhiko MinematsuPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- security issues
- upper bound
- information security
- access control
- lower bound
- security policies
- network security
- information assurance
- monte carlo
- security management
- security problems
- upper and lower bounds
- error bounds
- key management
- security threats
- computer security
- security mechanisms
- security requirements
- lower and upper bounds
- intrusion detection
- statistical databases
- cyber security
- data security
- tight bounds
- worst case