On The Exact Security of Message Authentication Using Pseudorandom Functions.
Ashwin JhaAvradip MandalMridul NandiPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- pseudorandom
- secret key
- encryption decryption
- stream cipher
- authentication protocol
- key agreement
- authentication scheme
- encryption algorithm
- security requirements
- security mechanisms
- identity authentication
- key distribution
- security analysis
- data encryption
- authentication mechanism
- user authentication
- random number
- private key
- factor authentication
- high security
- uniformly distributed
- security level
- fuzzy vault
- information security
- elliptic curve cryptography
- security issues
- identity management
- integrity verification
- virtual private network
- diffie hellman
- security services
- security properties
- key management
- random numbers
- authentication systems
- public key infrastructure
- biometric data
- public key
- encryption scheme
- biometric template
- ciphertext
- security model
- security systems
- public key cryptography
- cost effective
- intrusion detection
- elliptic curve
- trusted third party
- image authentication
- hash functions