Committing authenticated encryption based on SHAKE.
Joan DaemenSilvia MellaGilles Van AsschePublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- key exchange
- security analysis
- authentication scheme
- key exchange protocol
- image encryption
- encryption scheme
- password based authenticated key exchange
- elliptic curve cryptography
- diffie hellman
- digital signature
- secret key
- data encryption
- information systems
- key distribution
- ciphertext
- random number
- database systems
- encryption decryption
- multimedia streaming
- database