Cryptanalysis of Rocca and Feasibility of Its Security Claim.
Akinori HosoyamadaAkiko InoueRyoma ItoTetsu IwataKazuhiko MimematsuFerdinand SibleyrasYosuke TodoPublished in: IACR Trans. Symmetric Cryptol. (2022)
Keyphrases
- information security
- security requirements
- intrusion detection
- security issues
- information assurance
- access control
- statistical databases
- data security
- security systems
- security level
- security policies
- network management
- security analysis
- genetic algorithm
- network security
- operating system
- secret key
- functional requirements
- computer security
- user authentication
- block cipher