A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices.
Megha AgrawalDonghoon ChangSomitra Kumar SanadhyaPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- key exchange
- ciphertext
- mobile devices
- advanced encryption standard
- memory size
- encryption scheme
- main memory
- memory requirements
- fault model
- digital signature
- security analysis
- memory usage
- standard model
- data streams
- limited memory
- encryption algorithm
- security properties
- authentication scheme
- computing power
- secret key
- key exchange protocol
- multimedia streaming