Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption.
John BlackHector UrtubiaPublished in: USENIX Security Symposium (2002)
Keyphrases
- encryption scheme
- ciphertext
- standard model
- key exchange
- secret key
- public key
- security analysis
- smart card
- diffie hellman
- image encryption scheme
- authentication scheme
- hash functions
- data sharing
- encryption algorithm
- secret sharing scheme
- cca secure
- secure communication
- proxy re encryption
- lossless compression
- identity based encryption
- private key
- block cipher
- digital libraries
- public key encryption