Login / Signup
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
Christian Forler
Eik List
Stefan Lucks
Jakob Wenzel
Published in:
ACISP (2) (2016)
Keyphrases
</>
key exchange
authentication scheme
upper bound
encryption scheme
stream cipher
lightweight
security analysis
standard model
provably secure
key exchange protocol
lower bound
worst case
security properties