On the Security of the LAC Authenticated Encryption Algorithm.
Jiqiang LuPublished in: ACISP (2) (2016)
Keyphrases
- encryption algorithm
- encryption algorithms
- security analysis
- data encryption
- high security
- key exchange
- pseudorandom
- encryption scheme
- digital content
- key exchange protocol
- key agreement protocol
- authentication scheme
- chaotic maps
- image encryption
- ciphertext
- security requirements
- uniformly distributed
- low cost
- wireless sensor networks
- digital libraries
- metadata