The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3.
Mihir BellareBjörn TackmannPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- multi user
- encryption algorithms
- key exchange
- advanced encryption standard
- encryption decryption
- encryption algorithm
- secret key
- key distribution
- data encryption standard
- cryptographic algorithms
- key exchange protocol
- authentication scheme
- private key
- security analysis
- virtual environment
- diffie hellman
- key management
- multi granularity
- virtual world
- user interface
- data security
- encryption scheme
- data encryption
- key agreement protocol
- security properties
- multiple users
- image encryption
- high security
- single user
- security level
- secure communication
- elliptic curve cryptography
- public key
- augmented reality
- password based authenticated key exchange
- pseudorandom
- smart card
- security protocols
- block cipher
- public key infrastructure
- access control
- statistical databases
- security requirements
- digital signature
- ciphertext
- fault model
- cryptographic protocols
- collaborative writing
- authentication protocol
- elliptic curve
- data integrity
- multiple access
- s box
- hash functions