Secret key authentication capacity region, Part II: typical authentication rate.
Eric GravesJake B. PerazzonePaul L. YuRick S. BlumPublished in: CoRR (2020)
Keyphrases
- secret key
- authentication scheme
- authentication protocol
- encryption decryption
- key distribution
- secure communication
- session key
- smart card
- image authentication
- public key
- user authentication
- mutual authentication
- key agreement
- private key
- security analysis
- public key cryptography
- fault tolerant
- real time
- security mechanisms
- pseudorandom
- encryption scheme
- signature scheme
- secret data
- rfid tags
- diffie hellman
- stream cipher
- hash functions
- lightweight