Security of Hash-then-CBC Key Wrapping Revisited.
Yasushi OsakiTetsu IwataPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2013)
Keyphrases
- high security
- information security
- security requirements
- private key
- access control
- intrusion detection
- security policies
- security analysis
- data security
- security measures
- secure communication
- security problems
- security properties
- security level
- security systems
- security model
- information systems
- smart card
- data structure