Authenticated Encryption Mode for Beyond the Birthday Bound Security.
Tetsu IwataPublished in: AFRICACRYPT (2008)
Keyphrases
- key exchange
- key exchange protocol
- security analysis
- encryption algorithms
- security properties
- key management
- encryption scheme
- key agreement protocol
- encryption decryption
- diffie hellman
- authentication scheme
- key distribution
- upper bound
- data encryption
- lower bound
- elliptic curve cryptography
- private key
- high security
- digital signature
- encryption algorithm
- identity authentication
- secret key
- password based authenticated key exchange
- virtual private network
- image encryption
- security requirements
- digital rights management
- data security
- integrity verification
- intrusion detection
- security issues
- formal model
- secure communication
- information security
- data confidentiality
- statistical databases
- worst case
- security model
- elliptic curve
- network security
- mutual authentication
- public key infrastructure
- access control
- secret sharing scheme
- advanced encryption standard
- ciphertext