Security of E2 against Truncated Differential Cryptanalysis.
Shiho MoriaiMakoto SugitaKazumaro AokiMasayuki KandaPublished in: Selected Areas in Cryptography (1999)
Keyphrases
- information security
- security requirements
- access control
- network security
- intrusion detection
- security policies
- security issues
- computer security
- statistical databases
- neural network
- hash functions
- security mechanisms
- security threats
- security systems
- security vulnerabilities
- security management
- security problems
- elliptic curve
- key management
- evolutionary algorithm