Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers.
Florian UntersteinMarc SchinkThomas SchambergerLars TebelmannManuel IlgJohann HeyszlPublished in: IACR Trans. Cryptogr. Hardw. Embed. Syst. (2020)
Keyphrases
- key exchange
- authentication scheme
- image encryption
- hardware and software
- security analysis
- key exchange protocol
- file system
- secret key
- key management
- encryption scheme
- key distribution
- diffie hellman
- encryption algorithms
- digital signature
- encryption algorithm
- data encryption
- password based authenticated key exchange
- multimedia streaming
- key agreement protocol
- random number
- elliptic curve cryptography
- high security
- secure communication
- low cost
- real time