How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
Yusuke NaitoKazuki YoneyamaLei WangKazuo OhtaPublished in: ASIACRYPT (2009)
Keyphrases
- elliptic curve
- cryptographic protocols
- fuzzy vault
- information security
- network security
- private key
- intrusion detection
- security policies
- security issues
- security requirements
- public key
- access control
- security analysis
- security measures
- diffie hellman
- secret information
- security management
- public key cryptography
- key management
- key distribution
- computer security
- secret key
- computer networks
- intrusion detection system
- lightweight
- anomaly detection