On the Circular Security of Bit-Encryption.
Ron RothblumPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- encryption algorithms
- advanced encryption standard
- encryption scheme
- security properties
- key management
- encryption decryption
- block cipher
- random number generator
- data encryption
- encryption algorithm
- high security
- identity authentication
- random number
- security analysis
- public key cryptography
- key exchange
- security requirements
- digital rights management
- elliptic curve cryptography
- secret key
- data confidentiality
- virtual private network
- cryptographic protocols
- security policies
- s box
- information security
- access control
- integrity verification
- hough transform
- security protocols
- stream cipher
- data protection
- intrusion detection
- network security
- statistical databases
- digital signature
- public key infrastructure
- protection scheme
- security mechanisms
- data integrity
- data security
- security systems
- key distribution
- protection schemes
- secure communication