Tight Security for Key-Alternating Ciphers with Correlated Sub-keys.
Stefano TessaroXihu ZhangPublished in: ASIACRYPT (3) (2021)
Keyphrases
- private key
- key pre distribution
- high security
- stream cipher
- key management
- image encryption
- wireless sensor networks
- public key
- secret key
- block cipher
- security analysis
- secure communication
- key management scheme
- hash functions
- information security
- security threats
- chosen plaintext
- secret sharing scheme
- security protocols
- lower bound
- security issues
- network security
- intrusion detection
- signature scheme
- key distribution
- user authentication
- security mechanisms
- ad hoc networks
- statistical databases
- privacy preserving
- diffie hellman
- anomaly detection
- key establishment
- sensor networks