The Exact Security of PMAC with Three Powering-Up Masks.
Yusuke NaitoPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- intrusion detection
- statistical databases
- information security
- security requirements
- security problems
- security policies
- data integrity
- learning algorithm
- access control
- computer security
- security properties
- security protocols
- security level
- security mechanisms
- functional requirements
- brute force
- security issues
- network management
- intrusion detection system
- security threats
- security systems
- data sets
- security model
- key management
- computer networks
- edge detection
- genetic algorithm