On Security Arguments of the Second Round SHA-3 Candidates.
Elena AndreevaAndrey BogdanovBart MenninkBart PreneelChristian RechbergerPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- information security
- access control
- network security
- security policies
- intrusion detection
- security issues
- security level
- security systems
- computer security
- hash functions
- security mechanisms
- distributed systems
- neural network
- database
- block cipher
- security problems
- security properties
- information assurance
- cyber attacks
- cyber security
- security protocols
- key management