Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA.
Mustafa KhairallahPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- lower bound
- upper bound
- intrusion detection
- information security
- information assurance
- security policies
- worst case
- access control
- security issues
- security requirements
- network security
- security problems
- computer security
- data security
- security systems
- lower and upper bounds
- anomaly detection
- average case
- functional requirements
- key management
- upper and lower bounds
- security threats
- security management