The next generation of highly reliable and secure encryption for the IBM z13.
Todd W. ArnoldM. CheckAnne DamesJohn C. DaykaSilvio DragoneD. EvansWilliam Santiago-FernandezMichael D. HockerRichard KisleyThomas E. MorrisJ. PetreshockKlaus WernerPublished in: IBM J. Res. Dev. (2015)
Keyphrases
- highly reliable
- encryption scheme
- key exchange
- key management
- data encryption
- security properties
- stream cipher
- digital signature
- security analysis
- encryption decryption
- cryptographic protocols
- public key cryptography
- integrity verification
- secret key
- public key
- security requirements
- private key
- advanced encryption standard
- cryptographic algorithms
- standard model
- ciphertext
- diffie hellman
- data confidentiality
- digital rights management
- high security
- security protocols
- secure communication
- image encryption
- data protection
- key distribution
- authentication scheme
- security issues
- data sharing
- secret sharing scheme
- security mechanisms
- smart card
- encryption key
- lightweight
- wireless sensor networks
- blue gene
- security model
- mutual authentication
- resource constrained
- ad hoc networks