The Exact PRF-Security of NMAC and HMAC.
Peter GaziKrzysztof PietrzakMichal RybárPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- information security
- query expansion
- intrusion detection
- access control
- security policies
- security problems
- security issues
- pseudo relevance feedback
- information assurance
- security protocols
- computer security
- security requirements
- security mechanisms
- statistical databases
- security systems
- security level
- network security
- security threats
- security vulnerabilities
- information systems