Authenticated Encryption Schemes: A Systematic Review.
Mohamud Ahmed JimaleMuhammad Reza Z'abaMiss Laiha Mat KiahMohd Yamani Idna Bin IdrisNorziana JamilMoesfa Soeheila MohamadMohd Saufy RohmadPublished in: IEEE Access (2022)
Keyphrases
- systematic review
- encryption scheme
- empirical studies
- authentication scheme
- secret key
- security analysis
- standard model
- hash functions
- public key
- key distribution
- security model
- ciphertext
- cca secure
- data sharing
- public key encryption
- proxy re encryption
- secret sharing scheme
- lossless compression
- diffie hellman
- public key cryptosystem
- private key
- smart card
- image encryption
- homomorphic encryption
- image compression
- high dimensional