Security Reductions of the Second Round SHA-3 Candidates.
Elena AndreevaBart MenninkBart PreneelPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- security issues
- security requirements
- information security
- block cipher
- network security
- access control
- security threats
- hash functions
- security management
- statistical databases
- computer security
- information assurance
- security problems
- data security
- risk assessment
- cyber attacks
- security properties
- security systems
- security model
- security policies