Toward Provable Security of Substitution-Permutation Encryption Networks.
Zhi-Guo ChenStafford E. TavaresPublished in: Selected Areas in Cryptography (1998)
Keyphrases
- encryption algorithms
- key management
- security properties
- encryption decryption
- encryption scheme
- high security
- encryption algorithm
- security analysis
- key exchange
- cryptographic protocols
- enterprise network
- data encryption
- information security
- virtual private network
- access control
- security requirements
- security issues
- integrity verification
- digital rights management
- identity authentication
- computer networks
- social networks
- network security
- security policies
- public key cryptography
- elliptic curve cryptography
- intrusion detection
- key distribution
- hash functions
- stream cipher
- network structure
- anomaly detection
- security level