Ideal Key Derivation and Encryption in Simulation-Based Security.
Ralf KüstersMax TuengerthalPublished in: CT-RSA (2011)
Keyphrases
- high security
- private key
- encryption algorithms
- image encryption
- data encryption standard
- key management
- encryption scheme
- security properties
- secure communication
- encryption decryption
- public key
- security analysis
- data encryption
- identity authentication
- elliptic curve cryptography
- encryption algorithm
- security issues
- intrusion detection
- secret key
- digital signature
- information security
- security requirements
- block cipher
- stream cipher
- network security
- data confidentiality
- information systems
- security level
- data security
- key exchange
- data integrity
- cryptographic algorithms
- protection schemes
- security protocols