Login / Signup

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.

Christian ForlerEik ListStefan LucksJakob Wenzel
Published in: ACISP (2) (2016)
Keyphrases
  • key exchange
  • authentication scheme
  • upper bound
  • encryption scheme
  • stream cipher
  • lightweight
  • security analysis
  • standard model
  • provably secure
  • key exchange protocol
  • lower bound
  • worst case
  • security properties