On the provable security of BEAR and LION schemes.
Lara MainesMatteo PivaAnna RimoldiMassimiliano SalaPublished in: Appl. Algebra Eng. Commun. Comput. (2011)
Keyphrases
- intrusion detection
- key agreement
- security requirements
- provably secure
- information security
- security issues
- computer security
- security policies
- statistical databases
- network security
- access control
- key management scheme
- neural network
- information assurance
- security management
- diffie hellman
- data encryption
- data sets
- public key encryption
- high security
- security measures
- security threats
- security properties
- security analysis
- network management