Stronger Security Variants of GCM-SIV.
Tetsu IwataKazuhiko MinematsuPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- access control
- security issues
- intrusion detection
- information security
- security policies
- security problems
- security systems
- security requirements
- security management
- security mechanisms
- network security
- case study
- cyber security
- data security
- security level
- security properties
- databases
- risk assessment
- statistical databases
- website
- functional requirements
- decision making
- authentication protocol
- learning algorithm
- cyber attacks
- data mining