Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes.
Philipp JovanovicAtul LuykxBart MenninkPublished in: ASIACRYPT (1) (2014)
Keyphrases
- key exchange
- key exchange protocol
- security analysis
- encryption algorithms
- encryption scheme
- diffie hellman
- security properties
- key management
- key distribution
- encryption decryption
- key agreement protocol
- data encryption
- elliptic curve cryptography
- high security
- information security
- authentication scheme
- identity authentication
- secret key
- password based authenticated key exchange
- private key
- stream cipher
- digital rights management
- secure communication
- access control
- encryption algorithm
- mutual authentication
- integrity verification
- intrusion detection
- image encryption
- virtual private network
- network security
- public key
- standard model
- public key infrastructure
- data confidentiality
- digital signature
- public key cryptography
- authentication protocol
- security level
- cryptographic protocols
- security mechanisms
- block cipher
- security requirements
- statistical databases
- advanced encryption standard
- network communication
- outsourced databases
- smart card