The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys).
Jean-Jacques QuisquaterYvo DesmedtMarc DavioPublished in: CRYPTO (1985)
Keyphrases
- protection schemes
- key agreement
- private key
- secret key
- public key
- block cipher
- secure communication
- key management scheme
- provably secure
- privacy protection
- diffie hellman
- authentication scheme
- key distribution
- security properties
- hash functions
- public key encryption
- key agreement protocol
- access control
- security analysis
- elliptic curve
- secret sharing scheme
- data encryption
- key management
- signature scheme
- digital signature
- protection scheme
- scheduling problem
- advanced encryption standard
- wireless sensor networks
- pseudorandom
- mutual authentication
- image encryption
- secret sharing
- scheduling algorithm
- smart card
- security model
- encryption scheme
- authentication mechanism
- user authentication
- bilinear pairings
- digital signature scheme
- key establishment
- encryption key
- resource allocation
- standard model
- key exchange
- high security