Login / Signup
How to Abuse and Fix Authenticated Encryption Without Key Commitment.
Ange Albertini
Thai Duong
Shay Gueron
Stefan Kölbl
Atul Luykx
Sophie Schmieg
Published in:
USENIX Security Symposium (2022)
Keyphrases
</>
key exchange
high security
private key
image encryption
data mining
key distribution
authentication scheme
block cipher
secure communication
key exchange protocol
encryption algorithms
data encryption standard