Concealment and its Applications to Authenticated Encryption.
Yevgeniy DodisJee Hea AnPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- high security
- image encryption
- authentication scheme
- security analysis
- key exchange
- encryption algorithms
- post processing
- error concealment
- smart card
- key exchange protocol
- secret key
- encryption scheme
- error detection
- fault tolerant
- digital signature
- key distribution
- fault tolerance
- diffie hellman
- privacy preserving
- key agreement protocol
- neural network