Login / Signup
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations.
Mohammad Hajiabadi
Bruce M. Kapron
Published in:
CRYPTO (1) (2015)
Keyphrases
</>
advanced encryption standard
block cipher
encryption scheme
key exchange
key management
data encryption
encryption algorithms
security properties
security analysis
s box
cryptographic algorithms
digital signature
secret key
encryption decryption
cryptographic protocols
encryption algorithm
digital rights management
integrity verification
diffie hellman
security protocols
stream cipher
standard model
private key
random variables
mutual authentication
key distribution
data confidentiality
high security
wireless sensor networks
pseudorandom
security requirements
protection schemes
data protection
chaotic sequence
fault model
public key cryptography
secure communication
public key infrastructure
security mechanisms
public key
security issues
ad hoc networks
lightweight
access control