: Morphable Encryption and Encoding for Secure NVM.
Wei ZhaoDan FengYu Hua0001Wei TongJingning LiuJie XuChunyan LiGaoxiang XuYiran ChenPublished in: ICCAD (2021)
Keyphrases
- key exchange
- encryption scheme
- key management
- data encryption
- security properties
- digital signature
- cryptographic protocols
- security analysis
- encryption decryption
- stream cipher
- integrity verification
- digital rights management
- data confidentiality
- private key
- mutual authentication
- public key cryptography
- security requirements
- diffie hellman
- sensitive data
- cryptographic algorithms
- data protection
- advanced encryption standard
- smart card
- encryption algorithm
- public key
- encryption algorithms
- data security
- encryption key
- secret key
- security mechanisms
- ad hoc networks
- identity authentication
- wireless sensor networks
- formal model
- secure communication
- group communication
- security issues
- image encryption
- block cipher
- public key infrastructure
- user authentication
- authentication protocol
- standard model
- privacy preserving
- security protocols
- chaotic sequence
- encoding scheme
- resource constrained