A Modular Approach to the Security Analysis of Two-Permutation Constructions.
Yu Long ChenPublished in: ASIACRYPT (1) (2022)
Keyphrases
- security analysis
- smart card
- security requirements
- public key
- encryption scheme
- authentication protocol
- security model
- security properties
- image encryption
- high security
- encryption algorithm
- user authentication
- databases
- information security
- proxy signature scheme
- authentication scheme
- security mechanisms
- image quality