Implementing cryptographic pairings at standard security levels.
Andreas EngeJérôme MilanPublished in: CoRR (2014)
Keyphrases
- security properties
- security protocols
- key management
- encryption scheme
- cryptographic protocols
- encryption decryption
- iso iec
- security requirements
- information security
- statistical databases
- smart card
- authentication protocol
- security issues
- personal information
- security problems
- security threats
- secure communication
- stream cipher
- random number generator
- encryption key
- fuzzy vault