Reproducible Circularly-Secure Bit Encryption: Applications and Realizations.
Mohammad HajiabadiBruce M. KapronPublished in: CRYPTO (1) (2015)
Keyphrases
- advanced encryption standard
- block cipher
- encryption scheme
- key exchange
- key management
- data encryption
- encryption algorithms
- security properties
- security analysis
- s box
- cryptographic algorithms
- digital signature
- secret key
- encryption decryption
- cryptographic protocols
- encryption algorithm
- digital rights management
- integrity verification
- diffie hellman
- security protocols
- stream cipher
- standard model
- private key
- random variables
- mutual authentication
- key distribution
- data confidentiality
- high security
- wireless sensor networks
- pseudorandom
- security requirements
- protection schemes
- data protection
- chaotic sequence
- fault model
- public key cryptography
- secure communication
- public key infrastructure
- security mechanisms
- public key
- security issues
- ad hoc networks
- lightweight
- access control