Breaking and Repairing GCM Security Proofs.
Tetsu IwataKeisuke OhashiKazuhiko MinematsuPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- access control
- security issues
- information security
- network security
- security requirements
- security policies
- statistical databases
- intrusion detection
- data security
- security systems
- security level
- security properties
- theorem proving
- theorem prover
- databases
- security mechanisms
- formal proofs
- security analysis
- decision procedures
- information assurance