Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound.
Alexander MochEik ListPublished in: ACNS (2019)
Keyphrases
- information security
- access control
- upper bound
- security management
- security policies
- computer security
- security issues
- objective function
- database
- security properties
- weighted sum
- smart card
- intrusion detection
- worst case
- lower bound
- security threats
- security level
- square error
- key management
- security mechanisms
- security requirements
- distributed systems
- real world
- data sets