New Limits of Provable Security and Applications to ElGamal Encryption.
Sven SchägePublished in: EUROCRYPT (4) (2024)
Keyphrases
- encryption algorithms
- security properties
- key management
- encryption scheme
- encryption decryption
- high security
- data encryption
- encryption algorithm
- virtual private network
- security analysis
- key exchange
- identity authentication
- security requirements
- image encryption
- digital rights management
- public key
- public key cryptography
- stream cipher
- integrity verification
- secret key
- elliptic curve cryptography
- data security
- diffie hellman
- private key
- network security
- mutual authentication
- information security
- intrusion detection
- access control
- wireless sensor networks
- network management
- cryptographic protocols
- standard model
- security protocols
- security policies
- security mechanisms
- random number
- formal model
- data storage
- ciphertext
- data confidentiality
- cryptographic algorithms
- statistical databases
- advanced encryption standard
- sensitive data
- biometric systems