The Memory-Tightness of Authenticated Encryption.
Ashrujit GhoshalJoseph JaegerStefano TessaroPublished in: CRYPTO (1) (2020)
Keyphrases
- key exchange
- memory requirements
- memory usage
- memory space
- key exchange protocol
- data structure
- computing power
- neural network
- data sets
- encryption algorithms
- limited memory
- security properties
- chaotic sequence
- key agreement protocol
- diffie hellman
- private key
- security analysis
- encryption scheme
- secret key
- lower bound