Login / Signup

Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.

Michael BackesBirgit PfitzmannAndre Scedrov
Published in: CSF (2007)
Keyphrases
  • high security
  • block cipher
  • secure communication
  • encryption algorithms
  • security analysis
  • cyber attacks
  • java card
  • private key
  • image encryption