Cryptanalysis of the Authenticated Encryption Algorithm COFFE.
Ivan TjuawinataTao HuangHongjun WuPublished in: SAC (2015)
Keyphrases
- encryption algorithm
- s box
- secret key
- authentication scheme
- pseudorandom
- key distribution
- encryption scheme
- ciphertext
- encryption algorithms
- hash functions
- security analysis
- high security
- public key
- smart card
- data encryption
- chaotic maps
- initial conditions
- digital content
- chaotic sequence
- key management
- similarity search
- image encryption algorithm
- secure communication
- diffie hellman
- efficient implementation
- similarity measure