On The Exact Security of Message Authentication Using Pseudorandom Functions.
Ashwin JhaAvradip MandalMridul NandiPublished in: IACR Trans. Symmetric Cryptol. (2017)
Keyphrases
- pseudorandom
- secret key
- encryption decryption
- stream cipher
- encryption algorithm
- security requirements
- authentication protocol
- data encryption
- security analysis
- authentication scheme
- identity authentication
- security mechanisms
- authentication mechanism
- fuzzy vault
- key distribution
- key agreement
- smart card
- random number
- uniformly distributed
- user authentication
- high security
- integrity verification
- factor authentication
- biometric data
- private key
- elliptic curve cryptography
- security level
- information security
- key management
- trust negotiation
- access control
- key agreement protocol
- random numbers
- authentication systems
- public key
- virtual private network
- security services
- public key infrastructure
- identity management
- security systems
- messages exchanged
- security issues
- intrusion detection
- image authentication
- security properties
- security protocols