An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher.
Rodolphe LampeJacques PatarinYannick SeurinPublished in: ASIACRYPT (2012)
Keyphrases
- security analysis
- encryption algorithm
- stream cipher
- image encryption
- encryption scheme
- worst case
- smart card
- lower bound
- public key
- upper bound
- security requirements
- high security
- security model
- authentication protocol
- ciphertext
- security properties
- private key
- proxy signature scheme
- elliptic curve cryptography
- standard model
- user authentication
- authentication scheme
- mutual authentication
- databases
- hash functions
- image compression
- low cost
- multiresolution