On Committing Authenticated Encryption.
John ChanPhillip RogawayPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- key exchange
- security analysis
- key exchange protocol
- diffie hellman
- authentication scheme
- key management
- secret key
- digital signature
- security properties
- image encryption
- encryption algorithms
- key distribution
- databases
- password based authenticated key exchange
- data sets
- data encryption
- encryption algorithm
- encryption scheme
- digital libraries
- neural network