The Exact Security of PMAC with Two Powering-Up Masks.
Yusuke NaitoPublished in: IACR Trans. Symmetric Cryptol. (2019)
Keyphrases
- information security
- access control
- security vulnerabilities
- intrusion detection
- security policies
- security issues
- security level
- security requirements
- security measures
- security problems
- security protocols
- network management
- image processing
- computer security
- human operators
- data security
- security systems
- database
- distributed systems