Connecting tweakable and multi-key blockcipher security.
Jooyoung LeeAtul LuykxBart MenninkKazuhiko MinematsuPublished in: Des. Codes Cryptogr. (2018)
Keyphrases
- high security
- information security
- secure communication
- intrusion detection
- network security
- key management
- security requirements
- security level
- security analysis
- security mechanisms
- database
- functional requirements
- security issues
- statistical databases
- computer security
- security policies
- security systems
- case study
- neural network
- security measures
- real time