Verified Correctness and Security of mbedTLS HMAC-DRBG.
Katherine Q. YeMatthew GreenNaphat SanguansinLennart BeringerAdam PetcherAndrew W. AppelPublished in: CCS (2017)
Keyphrases
- information security
- information assurance
- intrusion detection
- key management
- security systems
- security issues
- security requirements
- security mechanisms
- access control
- security problems
- high security
- network security
- security level
- neural network
- statistical databases
- databases
- computer security
- security analysis
- security protocols
- cyber security