Comparing proofs of security for lattice-based encryption.
Daniel J. BernsteinPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- security properties
- encryption algorithms
- encryption scheme
- encryption decryption
- encryption algorithm
- key management
- high security
- identity authentication
- data encryption
- virtual private network
- key exchange
- security analysis
- security requirements
- public key cryptography
- information security
- stream cipher
- elliptic curve cryptography
- statistical databases
- cryptographic protocols
- mutual authentication
- digital rights management
- data confidentiality
- integrity verification
- access control
- security protocols
- network security
- advanced encryption standard
- diffie hellman
- public key
- security services
- theorem prover
- public key infrastructure
- smart card
- data security
- secure communication
- theorem proving
- security level
- private key
- image encryption
- digital signature
- security mechanisms
- cryptographic algorithms
- intrusion detection
- security issues
- secret key
- concept lattice