Security of Symmetric Primitives under Incorrect Usage of Keys.
Pooya FarshimClaudio OrlandiRazvan RosiePublished in: IACR Trans. Symmetric Cryptol. (2017)
Keyphrases
- information security
- security issues
- intrusion detection
- statistical databases
- key establishment
- key agreement
- low level
- network security
- functional requirements
- security threats
- security analysis
- building blocks
- security management
- security mechanisms
- usage patterns
- security problems
- private key
- security properties
- security level
- database systems
- xml documents
- cryptographic protocols
- network management
- security systems
- hash functions
- key management
- neural network
- secret key
- sensitive data