On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream.
Nam Yul YuPublished in: EURASIP J. Adv. Signal Process. (2017)
Keyphrases
- secret key
- stream cipher
- pseudorandom
- secret data
- encryption decryption
- key management
- encryption scheme
- encryption algorithm
- encryption algorithms
- secret sharing scheme
- information hiding
- cellular automata
- security properties
- identity authentication
- data encryption
- high security
- secret message
- diffie hellman
- smart card
- authentication scheme
- mutual authentication
- information hiding scheme
- security analysis
- private key
- authentication protocol
- key exchange
- chosen plaintext attack
- key distribution
- access control
- public key
- integrity verification
- information security
- digital rights management
- sensor networks
- public key cryptography
- image encryption
- secret sharing
- image encryption algorithm
- virtual private network
- singular value decomposition
- hash functions
- security issues
- rfid tags
- cryptographic protocols
- data protection
- security policies
- data security
- data confidentiality
- elliptic curve cryptography
- standard model
- data hiding
- ciphertext
- security requirements
- image authentication
- resource constrained
- security mechanisms