Secure public key hardware for IoT applications.
Poulami DasDebapriya Basu RoyDebdeep MukhopadhyayPublished in: MWSCAS (2016)
Keyphrases
- public key
- public key encryption scheme
- private key
- security analysis
- public key encryption
- digital signature
- diffie hellman
- security model
- public key cryptography
- authentication scheme
- authentication protocol
- message authentication codes
- key management
- secret key
- secure communication
- encryption scheme
- session key
- public key cryptosystem
- provably secure
- signature scheme
- image authentication
- low cost
- key distribution
- homomorphic encryption
- blind signature
- real time
- public key infrastructure
- cca secure
- standard model
- key exchange
- elliptic curve cryptography
- security level
- ciphertext
- rfid tags
- security properties
- trusted third party
- embedded systems
- proxy re encryption
- blind signature scheme
- user authentication
- cloud computing
- peer to peer
- digital images