Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.
Yaobin ShenFerdinand SibleyrasPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- high security
- access control
- lower bound
- security systems
- intrusion detection
- information security
- security policies
- computer security
- security issues
- statistical databases
- information assurance
- security problems
- data security
- real time
- computer systems
- upper bound
- information systems
- data mining
- security requirements
- key management
- security threats
- learning algorithm
- data encryption