Implementing TLS with Verified Cryptographic Security.
Karthikeyan BhargavanCédric FournetMarkulf KohlweissAlfredo PirontiPierre-Yves StrubPublished in: IEEE Symposium on Security and Privacy (2013)
Keyphrases
- security protocols
- key management
- security properties
- smart card
- encryption scheme
- security requirements
- cryptographic protocols
- information security
- fuzzy vault
- access control
- high assurance
- secure communication
- security mechanisms
- encryption key
- encryption decryption
- stream cipher
- random number generator
- computer security
- security policies
- public key cryptography
- security issues
- security analysis
- security systems
- intrusion detection
- ad hoc networks
- security model
- security threats
- elliptic curve cryptography
- network security
- advanced encryption standard
- cryptographic algorithms
- digital signature
- distributed systems
- sensitive data
- statistical databases
- high security
- biometric data
- security level
- hash functions
- formal model
- homomorphic encryption
- protection schemes
- public key encryption