Insecurity of RCB: Leakage-Resilient Authenticated Encryption.
Farzaneh AbedFrancesco BertiStefan LucksPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- key exchange
- security analysis
- authentication scheme
- image encryption
- encryption algorithms
- key exchange protocol
- secret key
- key management
- key distribution
- encryption scheme
- digital signature
- elliptic curve cryptography
- data encryption standard
- diffie hellman
- key agreement protocol
- data leakage prevention
- encryption algorithm
- security properties
- real time
- secure communication
- high security
- database
- ciphertext
- information hiding
- smart card
- wireless sensor networks
- neural network