Login / Signup
Improved Indifferentiability Security Bound for the JH Mode.
Dustin Moody
Souradyuti Paul
Daniel Smith-Tone
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
information security
upper bound
security requirements
lower bound
intrusion detection
network security
access control
improved algorithm
network management
security issues
security level
security threats
databases
web services
security mechanisms
security systems