A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes.
Charlotte LefevrePublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- key exchange
- key exchange protocol
- security analysis
- encryption scheme
- key management
- security properties
- encryption algorithms
- encryption decryption
- key distribution
- online learning
- data security
- diffie hellman
- secret key
- encryption algorithm
- authentication scheme
- data confidentiality
- key agreement protocol
- security mechanisms
- data encryption
- intrusion detection
- computational complexity
- secure communication
- high security
- security requirements
- cryptographic protocols
- elliptic curve cryptography
- private key
- worst case
- information security
- identity authentication
- network security
- mutual authentication
- wireless sensor networks
- stream cipher
- smart card
- security services
- theorem prover
- security policies
- digital signature
- public key