Ideal Key Derivation and Encryption in Simulation-based Security.
Ralf KüstersMax TuengerthalPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- high security
- private key
- encryption algorithms
- data encryption standard
- security analysis
- encryption scheme
- security properties
- image encryption
- key management
- data encryption
- secure communication
- access control
- encryption decryption
- public key
- encryption algorithm
- elliptic curve cryptography
- identity authentication
- key exchange
- integrity verification
- public key cryptography
- block cipher
- intrusion detection
- stream cipher
- network security
- security policies
- statistical databases
- digital signature
- public key infrastructure
- information security
- virtual private network
- security requirements
- cryptographic protocols
- key distribution
- ciphertext
- signature scheme
- encryption key
- security mechanisms