Breaking and Repairing GCM Security Proofs.
Tetsu IwataKeisuke OhashiKazuhiko MinematsuPublished in: CRYPTO (2012)
Keyphrases
- information security
- security issues
- intrusion detection
- security policies
- security level
- statistical databases
- access control
- network security
- theorem proving
- security requirements
- computer security
- security analysis
- information systems
- security problems
- security mechanisms
- key management
- security properties
- security measures
- security vulnerabilities
- high security
- databases
- security model
- decision procedures
- functional requirements
- information sharing
- social networks
- neural network