A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations.
Ju-Sung KangNayoung KimWangho JuOkyeon YiPublished in: WISTP (2014)
Keyphrases
- security analysis
- high security
- pseudorandom
- encryption algorithm
- stream cipher
- secret key
- private key
- public key
- smart card
- authentication scheme
- security requirements
- security properties
- image encryption
- encryption scheme
- authentication protocol
- user authentication
- mutual authentication
- uniformly distributed
- low cost
- data structure