Nonce-Based Cryptography: Retaining Security when Randomness Fails.
Mihir BellareBjörn TackmannPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- information security
- encryption algorithms
- security issues
- information assurance
- intrusion detection
- access control
- elliptic curve cryptography
- cellular automata
- security requirements
- network security
- information systems
- cryptographic algorithms
- security systems
- security level
- computer security
- functional requirements
- security analysis
- data security
- countermeasures
- encryption algorithm
- security management
- security mechanisms
- security policies
- security protocols
- malware detection
- security measures
- security vulnerabilities
- network management