Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem.
Phillip RogawayThomas ShrimptonPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- high security
- key exchange
- private key
- secure communication
- key distribution
- key exchange protocol
- encryption algorithms
- image encryption
- security analysis
- data encryption standard
- key agreement protocol
- encryption scheme
- security properties
- authentication scheme
- encryption decryption
- public key
- diffie hellman
- key management
- elliptic curve cryptography
- secret key
- data encryption
- encryption algorithm
- identity authentication
- smart card
- password based authenticated key exchange
- block cipher
- integrity verification
- network security
- mutual authentication
- data confidentiality
- stream cipher
- ciphertext
- data security
- security protocols
- signature scheme
- security services
- secret sharing scheme
- cryptographic algorithms
- authentication protocol
- security policies