A new authenticated encryption technique for handling long ciphertexts in memory constrained devices.
Megha AgrawalDonghoon ChangSomitra Kumar SanadhyaPublished in: Int. J. Appl. Cryptogr. (2017)
Keyphrases
- key exchange
- ciphertext
- memory usage
- encryption scheme
- embedded systems
- security properties
- mobile devices
- memory size
- security analysis
- computing power
- secret key
- memory requirements
- diffie hellman
- advanced encryption standard
- authentication scheme
- multimedia streaming
- standard model
- encryption algorithm
- digital signature
- limited memory
- memory space
- random access
- fault model
- key exchange protocol
- smart phones
- smart card