Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption.
Bart MenninkReza ReyhanitabarDamian VizárPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- key exchange
- key management
- key exchange protocol
- encryption algorithms
- security properties
- state space
- data encryption
- security analysis
- key distribution
- network security
- information security
- elliptic curve cryptography
- high security
- identity authentication
- encryption scheme
- information systems
- intrusion detection
- digital rights management
- encryption decryption
- public key cryptography
- diffie hellman
- private key
- security protocols
- security policies