On the Security of Tweakable Modes of Operation: TBC and TAE.
Peng WangDengguo FengWenling WuPublished in: ISC (2005)
Keyphrases
- security issues
- network security
- information assurance
- information security
- security policies
- security protocols
- access control
- security vulnerabilities
- computer security
- security requirements
- statistical databases
- security level
- security management
- intrusion detection
- data mining
- encryption scheme
- key management
- data security
- security systems
- security problems