Secret-key cryptography from ideal primitives: A systematic overview.
Peter GaziStefano TessaroPublished in: ITW (2015)
Keyphrases
- secret key
- smart card
- public key
- pseudorandom
- authentication scheme
- public key cryptography
- secure communication
- cellular automata
- stream cipher
- information security
- encryption decryption
- encryption scheme
- key distribution
- hash functions
- security level
- authentication protocol
- forward secure
- secret data
- key management
- signature scheme
- block cipher
- ciphertext
- key establishment