Tweakable Blockciphers with Beyond Birthday-Bound Security.
Will LandeckerThomas ShrimptonR. Seth TerashimaPublished in: CRYPTO (2012)
Keyphrases
- information security
- intrusion detection
- security issues
- information assurance
- upper bound
- security problems
- lower bound
- security systems
- access control
- network security
- security policies
- databases
- security level
- data security
- security mechanisms
- functional requirements
- statistical databases
- error bounds
- worst case
- information systems
- security requirements
- network management
- computer security
- cyber security
- data mining
- security threats
- security management
- real time