Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound.
Alexander MochEik ListPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- upper bound
- lower bound
- security systems
- intrusion detection
- access control
- security issues
- security analysis
- linear functions
- worst case
- information security
- security policies
- error bounds
- security mechanisms
- security problems
- network management
- real time
- information assurance
- security properties
- security threats
- security level
- high security
- cyber attacks
- security model
- data security
- computer security
- security requirements
- biometric systems
- electronic commerce
- objective function
- information systems
- neural network