Tight Security Bounds for Key-Alternating Ciphers.
Shan ChenJohn P. SteinbergerPublished in: EUROCRYPT (2014)
Keyphrases
- upper bound
- lower bound
- high security
- stream cipher
- block cipher
- worst case
- generalization error bounds
- computer security
- chosen plaintext
- private key
- information security
- upper and lower bounds
- image encryption
- security protocols
- security policies
- secret key
- information assurance
- functional requirements
- security systems
- hash functions
- security issues
- secure communication
- security measures
- intrusion detection
- access control
- distributed systems
- learning algorithm