Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks.
Yuan GaoChun GuoMeiqin WangWeijia WangJiejing WenPublished in: IACR Trans. Symmetric Cryptol. (2020)
Keyphrases
- access control
- intrusion detection
- social networks
- upper bound
- security systems
- computer security
- enterprise network
- heterogeneous networks
- security requirements
- information security
- complex networks
- worst case
- network design
- linear systems
- nonlinear functions
- security level
- block cipher
- error bounds
- network analysis
- security policies
- security issues
- network structure
- network size
- security problems
- neural network