On the provable security of BEAR and LION schemes
Lara MainesMatteo PivaAnna RimoldiMassimiliano SalaPublished in: CoRR (2011)
Keyphrases
- information security
- intrusion detection
- key agreement
- security systems
- information assurance
- security issues
- graphical password
- access control
- network security
- security requirements
- key management scheme
- computer security
- security analysis
- cyber security
- provably secure
- security properties
- special case
- security model
- user authentication
- cryptographic protocols
- data security
- security problems
- neural network
- security protocols
- security mechanisms
- cryptographic algorithms
- data mining