Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack.
Jun MuramatsuKazuyuki YoshimuraKenichi AraiPeter DavisPublished in: IEEE Trans. Inf. Theory (2006)
Keyphrases
- secret key
- smart card
- authentication scheme
- pseudorandom
- public key
- secure communication
- key management
- stream cipher
- key distribution
- forward secure
- data sources
- encryption scheme
- encryption decryption
- authentication protocol
- ciphertext
- security level
- hash functions
- private key
- lightweight
- block cipher
- secret data
- database systems
- key agreement
- real time