Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
Jaechul SungSangjin LeeJong In LimWonil LeeOkyeon YiPublished in: ICISC (2001)
Keyphrases
- security analysis
- online advertising
- smart card
- high security
- public key
- sponsored search
- security model
- security requirements
- authentication protocol
- image encryption
- security properties
- encryption scheme
- key exchange
- user authentication
- proxy signature scheme
- elliptic curve cryptography
- information systems
- encryption algorithm
- low cost
- data mining
- databases