Tweakable Blockciphers with Beyond Birthday-Bound Security.
Will LandeckerThomas ShrimptonR. Seth TerashimaPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- upper bound
- information security
- security requirements
- security systems
- access control
- computer security
- intrusion detection
- network security
- security policies
- lower bound
- statistical databases
- information assurance
- security problems
- security issues
- worst case
- lightweight
- data security
- security level
- security threats
- security management
- database
- error bounds
- user authentication
- security properties
- genetic algorithm
- data sets