The Security and Performance of "GCM" when Short Multiplications Are Used Instead.
Kazumaro AokiKan YasudaPublished in: Inscrypt (2012)
Keyphrases
- access control
- information security
- security policies
- security issues
- information assurance
- network security
- security requirements
- sensitive data
- security mechanisms
- security systems
- intrusion detection
- computer security
- web services
- risk assessment
- statistical databases
- database
- human operators
- security level
- malware detection
- databases