Succinctly-Committing Authenticated Encryption.
Mihir BellareViet Tung HoangPublished in: CRYPTO (4) (2024)
Keyphrases
- key exchange
- key exchange protocol
- security analysis
- encryption algorithms
- diffie hellman
- databases
- encryption scheme
- digital signature
- password based authenticated key exchange
- data encryption standard
- key agreement protocol
- key distribution
- multimedia streaming
- image encryption
- authentication scheme
- high security
- ciphertext
- information hiding
- low cost
- information systems
- data sets