Login / Signup
A Provable-Security Treatment of the Key-Wrap Problem.
Phillip Rogaway
Thomas Shrimpton
Published in:
EUROCRYPT (2006)
Keyphrases
</>
high security
information security
security requirements
access control
intrusion detection
key management
computer security
security analysis
security threats
secure communication
database
data mining
security policies
information assurance