On ELFs, Deterministic Encryption, and Correlated-Input Security.
Mark ZhandryPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- encryption algorithms
- encryption decryption
- encryption scheme
- security properties
- data encryption
- key management
- identity authentication
- high security
- encryption algorithm
- integrity verification
- key exchange
- public key infrastructure
- security analysis
- digital rights management
- input data
- public key cryptography
- stream cipher
- elliptic curve cryptography
- virtual private network
- secret key
- intrusion detection
- information security
- network security
- security mechanisms
- security systems
- data security
- security issues
- cryptographic protocols
- advanced encryption standard
- secure communication
- image encryption
- information hiding
- security level
- security services
- public key
- cryptographic algorithms
- statistical databases