Login / Signup
Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption.
Bart Mennink
Reza Reyhanitabar
Damian Vizár
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
key exchange
key management
key exchange protocol
encryption algorithms
security properties
state space
data encryption
security analysis
key distribution
network security
information security
elliptic curve cryptography
high security
identity authentication
encryption scheme
information systems
intrusion detection
digital rights management
encryption decryption
public key cryptography
diffie hellman
private key
security protocols
security policies