Security of Truncated Permutation Without Initial Value.
Lorenzo GrassiBart MenninkPublished in: ASIACRYPT (2) (2022)
Keyphrases
- information security
- intrusion detection
- security issues
- security policies
- security measures
- access control
- statistical databases
- data mining
- security systems
- security requirements
- neural network
- risk assessment
- network security
- computer security
- database systems
- cyber attacks
- security level
- security problems
- security management
- doubly stochastic