On ELFs, Deterministic Encryption, and Correlated-Input Security.
Mark ZhandryPublished in: EUROCRYPT (3) (2019)
Keyphrases
- encryption algorithms
- encryption decryption
- security properties
- encryption scheme
- high security
- key management
- identity authentication
- security analysis
- access control
- stream cipher
- encryption algorithm
- information security
- security requirements
- digital rights management
- key exchange
- intrusion detection
- data encryption
- public key cryptography
- virtual private network
- elliptic curve cryptography
- cryptographic algorithms
- security policies
- statistical databases
- security issues
- integrity verification
- secret key
- image encryption
- data protection
- network security
- highly correlated
- public key infrastructure
- security systems
- sensitive data
- input data