Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation.
Bo ZhuYin TanGuang GongPublished in: CANS (2013)
Keyphrases
- digital images
- security issues
- information security
- formal concept analysis
- key agreement
- private key
- network security
- signature verification
- security requirements
- access control
- security mechanisms
- data security
- intrusion detection
- statistical databases
- security policies
- information systems
- data integrity
- security protocols
- hash functions
- security model
- trusted computing
- galois lattices