Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds.
Priyanka BoseViet Tung HoangStefano TessaroPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- multi user
- private key
- virtual environment
- block cipher
- high security
- multi granularity
- user interface
- virtual world
- multiple users
- upper bound
- single user
- cryptographic algorithms
- data encryption standard
- augmented reality
- public key
- image encryption
- lower bound
- information security
- multi touch
- encryption algorithm
- encryption algorithms
- secret key
- security analysis
- secure communication
- multiple access
- encryption decryption
- advanced encryption standard
- security policies
- network security
- security protocols
- security requirements
- human computer interaction
- intrusion detection
- smart objects