Stronger Security Variants of GCM-SIV.
Tetsu IwataKazuhiko MinematsuPublished in: IACR Trans. Symmetric Cryptol. (2016)
Keyphrases
- information security
- access control
- security policies
- security issues
- statistical databases
- security requirements
- security analysis
- information assurance
- security problems
- intrusion detection
- security model
- sensitive data
- high security
- security management
- computer security
- encryption scheme
- real time
- data integrity
- cyber security
- data security
- network security
- security level
- security properties
- low cost
- case study
- data mining
- databases