On modes of operations of a block cipher for authentication and authenticated encryption.
Debrup ChakrabortyPalash SarkarPublished in: Cryptogr. Commun. (2016)
Keyphrases
- block cipher
- secret key
- authentication scheme
- key distribution
- encryption decryption
- key exchange
- security analysis
- hash functions
- smart card
- key management
- public key
- encryption scheme
- elliptic curve cryptography
- s box
- secure communication
- key agreement protocol
- image authentication
- diffie hellman
- authentication protocol
- data encryption
- lightweight
- identity authentication
- private key
- key exchange protocol
- public key cryptography
- security requirements
- data sets
- ciphertext
- integrity verification
- user authentication
- initial conditions
- data points