The security impact of a new cryptographic library.
Daniel J. BernsteinTanja LangePeter SchwabePublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- key management
- security protocols
- security properties
- encryption scheme
- fuzzy vault
- encryption decryption
- random number generator
- cryptographic protocols
- information security
- stream cipher
- encryption key
- secure communication
- network security
- cryptographic algorithms
- smart card
- security systems
- computer security
- security issues
- security analysis
- security level
- secret key
- security threats
- high assurance
- statistical databases
- security policies
- elliptic curve cryptography
- intrusion detection
- information systems
- public key encryption
- public key cryptography
- security requirements
- access control
- digital libraries