Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption.
Omar ChoudaryFelix GröbertJoachim MetzPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security analysis
- encryption scheme
- encryption algorithm
- public key
- ciphertext
- standard model
- secret key
- image encryption
- key exchange
- high security
- smart card
- security model
- security properties
- authentication protocol
- mutual authentication
- data sharing
- diffie hellman
- lossless compression
- user authentication
- elliptic curve cryptography
- security requirements
- secret sharing scheme
- authentication scheme
- private key
- hash functions
- provably secure
- data structure
- public key cryptography
- digital signature