Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
Cas CremersAlexander DaxCharlie JacommeMang ZhaoPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- automated analysis
- key exchange
- key agreement protocol
- session key
- key distribution
- secret key
- key management
- key exchange protocol
- diffie hellman
- security analysis
- cryptographic protocols
- security properties
- mutual authentication
- security protocols
- encryption scheme
- private key
- authentication scheme
- biomedical imaging
- authentication protocol
- visual analysis
- group communication
- encryption decryption
- modular exponentiation
- secure communication
- smart card
- standard model
- security requirements
- provably secure
- password based authenticated key exchange
- homomorphic encryption
- digital signature
- elliptic curve
- encryption algorithms
- video analysis
- wireless sensor networks
- security model
- information visualization
- privacy protection