Login / Signup
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Francesco Berti
Olivier Pereira
François-Xavier Standaert
Published in:
AFRICACRYPT (2019)
Keyphrases
</>
block cipher
hash functions
lightweight
key distribution
sensitive data
digital images
s box
security analysis
similarity measure
authentication scheme
security issues
data protection
security protocols
data sets
wireless networks
sensor networks
nearest neighbor
database systems