Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware.
Ziya Alper GençGabriele LenziniPeter Y. A. RyanPublished in: CECC (2018)
Keyphrases
- security analysis
- smart card
- high security
- security properties
- encryption scheme
- elliptic curve cryptography
- private key
- public key
- secure communication
- security requirements
- security model
- image encryption
- public key cryptography
- stream cipher
- digital signature
- authentication protocol
- databases
- mutual authentication
- encryption algorithm
- user authentication
- information security
- authentication scheme
- secret key
- low cost