Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem.
Andrius RaulynaitisEligijus SakalauskasSaulius JapertasPublished in: Informatica (2010)
Keyphrases
- security analysis
- matrix decomposition
- encryption algorithm
- image encryption
- encryption scheme
- low rank
- mutual authentication
- authentication protocol
- nonnegative matrix factorization
- public key
- security requirements
- smart card
- singular values
- high security
- secure electronic
- singular value decomposition
- low rank matrix
- ciphertext
- user authentication
- secret key
- matrix factorization
- private key
- linear combination
- elliptic curve cryptography
- negative matrix factorization
- standard model
- hash functions
- authentication scheme
- convex optimization
- missing data
- similarity measure