Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
Philipp JovanovicAtul LuykxBart MenninkYu SasakiKan YasudaPublished in: J. Cryptol. (2019)
Keyphrases
- key exchange
- key exchange protocol
- encryption algorithms
- security analysis
- key management
- security properties
- encryption scheme
- key agreement protocol
- encryption decryption
- high security
- encryption algorithm
- key distribution
- authentication scheme
- data encryption
- image encryption
- diffie hellman
- identity authentication
- password based authenticated key exchange
- elliptic curve cryptography
- data confidentiality
- intrusion detection
- integrity verification
- virtual private network
- data security
- access control
- information security
- security requirements
- secure communication
- cryptographic algorithms
- security issues
- network security
- public key cryptography
- digital signature
- stream cipher
- sensitive data
- digital rights management
- secret sharing scheme
- security model
- mutual authentication
- security protocols