Login / Signup
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions.
Avijit Dutta
Ashwin Jha
Mridul Nandi
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
security analysis
smart card
security requirements
high security
security model
user authentication
public key
image encryption
security properties
hash functions
encryption scheme
encryption algorithm
motion estimation
authentication scheme
mutual authentication
proxy signature scheme