Salvaging Weak Security Bounds for Blockcipher-Based Constructions.
Thomas ShrimptonR. Seth TerashimaPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- information security
- upper bound
- lower bound
- security issues
- security requirements
- security problems
- intrusion detection
- security management
- network security
- statistical databases
- computer security
- data security
- lower and upper bounds
- cyber security
- error bounds
- tight bounds
- information assurance
- data sets
- key management
- encryption scheme
- upper and lower bounds
- vc dimension
- computer networks
- cloud computing
- model selection
- access control
- worst case