The Memory-Tightness of Authenticated Encryption.
Ashrujit GhoshalJoseph JaegerStefano TessaroPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- key exchange
- lower bound
- memory requirements
- memory usage
- image encryption
- computing power
- authentication scheme
- memory size
- random access
- key management
- memory space
- security analysis
- limited memory
- key distribution
- encryption algorithms
- key exchange protocol
- encryption decryption
- secret key
- computational power
- database management systems