On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis.
Farzaneh AbedEik ListStefan LucksPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- information security
- information assurance
- security issues
- intrusion detection
- security requirements
- security policies
- network security
- statistical databases
- security level
- security mechanisms
- security threats
- security problems
- computer security
- secret key
- access control
- key management
- neural network
- authentication protocol
- scatter search
- cyber attacks
- security properties
- graph theoretic
- signature scheme
- security vulnerabilities