Reconsidering the Security Bound of AES-GCM-SIV.
Tetsu IwataYannick SeurinPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- advanced encryption standard
- cryptographic algorithms
- encryption algorithms
- security issues
- encryption decryption
- intrusion detection
- information security
- upper bound
- security level
- encryption algorithm
- network security
- lower bound
- secret key
- security systems
- security policies
- security problems
- functional requirements
- worst case
- computer security
- security protocols
- security threats
- security requirements
- access control
- security management
- block cipher
- security mechanisms
- computer networks
- security measures
- data security
- key management
- sensor networks