Security of the Five-Round Kasumi Type Permutation.
Tetsu IwataTohru YagiKaoru KurosawaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2008)
Keyphrases
- security systems
- information security
- computer security
- security issues
- access control
- security problems
- security analysis
- security mechanisms
- security policies
- neural network
- biometric systems
- key management
- hash functions
- network security
- security protocols
- data security
- intrusion detection
- security threats
- block cipher