Login / Signup
Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication.
Eric Graves
Jake B. Perazzone
Paul L. Yu
Rick S. Blum
Published in:
IEEE Trans. Inf. Theory (2022)
Keyphrases
</>
secret key
authentication scheme
key distribution
session key
smart card
encryption decryption
secure communication
public key
key management
authentication protocol
image authentication
pseudorandom
group communication
user authentication
security level
private key
diffie hellman
hash functions
secret data
key exchange protocol
key exchange
mutual authentication
stream cipher
key agreement
security requirements
key agreement protocol
provably secure
signature scheme
digital signature
data points