Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.
Yaobin ShenFerdinand SibleyrasPublished in: ASIACRYPT (2) (2022)
Keyphrases
- high security
- security problems
- data security
- data sets
- information assurance
- private key
- access control
- statistical databases
- security issues
- security threats
- functional requirements
- database
- upper bound
- lower bound
- security policies
- error bounds
- intrusion detection
- worst case
- security management
- secure communication
- data mining
- encryption algorithms
- neural network
- protection schemes