Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys.
Stefano TessaroXihu ZhangPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- private key
- secret key
- key pre distribution
- stream cipher
- block cipher
- key distribution
- high security
- public key
- security analysis
- secure communication
- upper bound
- image encryption
- security requirements
- lower bound
- hash functions
- computer security
- worst case
- chosen plaintext
- signature scheme
- security protocols
- security policies
- information security
- advanced encryption standard
- database
- security model
- security mechanisms
- security issues
- chosen plaintext attack