Beyond full-bit secure authenticated encryption without input-length limitation.
Akiko InouePublished in: IET Inf. Secur. (2022)
Keyphrases
- key exchange
- key exchange protocol
- security analysis
- advanced encryption standard
- diffie hellman
- authentication scheme
- encryption scheme
- key management
- block cipher
- key distribution
- security properties
- secret key
- key agreement protocol
- cryptographic protocols
- digital signature
- data encryption
- information hiding
- wireless sensor networks
- encryption decryption
- security requirements
- stream cipher
- elliptic curve cryptography
- password based authenticated key exchange
- image encryption
- encryption algorithms
- cryptographic algorithms
- high security
- secure communication
- security protocols
- smart card