True Random Number Generators Secure in a Changing Environment: Improved Security Bounds.
Maciej SkorskiPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- changing environment
- random number generators
- security requirements
- security issues
- security level
- security measures
- security mechanisms
- data security
- data encryption
- security services
- security management
- security analysis
- information security
- authentication mechanism
- key management
- security protocols
- security properties
- dynamic environments
- authentication scheme
- authentication protocol
- sensitive data
- stream cipher
- autonomous agents
- encryption scheme
- cryptographic protocols
- key agreement protocol
- integrity verification
- key exchange
- user authentication
- access control
- intrusion detection
- security patterns
- electronic voting
- random number
- key exchange protocol
- security architecture
- public key encryption
- lower bound
- rfid systems
- upper bound
- security model
- lightweight
- smart card
- real time
- mobile agent system
- key agreement
- security policies
- standard model
- private key
- diffie hellman
- identity management
- worst case
- mobile robot
- trusted computing
- factor authentication
- learning algorithm