Cryptographic Agility and its Relation to Circular Encryption.
Tolga AcarMira BelenkiyMihir BellareDavid CashPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- encryption scheme
- data encryption standard
- security properties
- encryption decryption
- key management
- smart card
- digital signature
- encryption algorithms
- public key cryptography
- cryptographic protocols
- secret key
- elliptic curve cryptography
- business process
- cryptographic algorithms
- advanced encryption standard
- security analysis
- hough transform
- secure communication
- stream cipher
- public key
- formal model
- image encryption
- encryption key
- competitive advantage
- supply chain
- security protocols
- high security
- standard model
- ad hoc networks
- lightweight