GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.
Shay GueronYehuda LindellPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- key exchange
- security analysis
- authentication scheme
- image encryption
- secret key
- anomaly detection
- key exchange protocol
- intrusion detection system
- encryption algorithms
- fixed length
- key distribution
- key management
- diffie hellman
- error correcting codes
- secure communication
- encryption algorithm
- string matching
- key agreement protocol
- data encryption
- countermeasures
- chaotic sequence