Reproducible Circularly Secure Bit Encryption: Applications and Realizations.
Mohammad HajiabadiBruce M. KapronPublished in: J. Cryptol. (2017)
Keyphrases
- advanced encryption standard
- block cipher
- key exchange
- encryption scheme
- encryption algorithms
- key management
- data encryption
- stream cipher
- security properties
- security analysis
- s box
- secret key
- cryptographic algorithms
- integrity verification
- cryptographic protocols
- private key
- digital signature
- lightweight
- encryption algorithm
- pseudorandom
- encryption decryption
- public key cryptography
- protection schemes
- secure communication
- random variables
- security requirements
- public key
- digital rights management
- data confidentiality
- hash functions
- security protocols
- mutual authentication
- chaotic sequence
- standard model
- identity authentication
- ciphertext
- key distribution
- high security
- image encryption
- protection scheme
- authentication protocol
- security model
- fault model
- diffie hellman