Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Olivier PereiraFrançois-Xavier StandaertSrinivas VivekPublished in: CCS (2015)
Keyphrases
- encryption decryption
- public key cryptography
- elliptic curve cryptography
- public key
- encryption scheme
- security analysis
- symmetric key
- data security
- secret key
- digital signature
- elliptic curve
- security properties
- secure communication
- key management
- authentication scheme
- security requirements
- high level
- cryptographic algorithms
- provably secure
- data encryption standard
- smart card
- encryption algorithms
- private key
- access control
- identity authentication
- data encryption
- security services
- standard model
- mutual authentication
- authentication protocol
- high security
- security model
- image encryption
- image authentication
- digital watermarking
- public key infrastructure
- security mechanisms
- key distribution
- cryptographic protocols
- key exchange
- encryption algorithm
- trusted third party
- data confidentiality
- secret sharing scheme
- resource constrained
- user authentication