On the Unprovable Security of 2-Key XCBC.
Peng WangDengguo FengWenling WuLiting ZhangPublished in: ACISP (2008)
Keyphrases
- high security
- security issues
- key management
- security threats
- neural network
- access control
- intrusion detection
- information security
- network security
- security requirements
- security analysis
- security measures
- security level
- encryption algorithms
- database
- encryption algorithm
- security systems
- genetic algorithm
- data sets