Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments.
Changhoon LeeJongsung KimSeokhie HongYangsun LeePublished in: J. Univers. Comput. Sci. (2009)
Keyphrases
- security analysis
- encryption algorithm
- image encryption
- pervasive computing environments
- encryption scheme
- stream cipher
- public key
- smart card
- security requirements
- high security
- computing environments
- artificial intelligence
- elliptic curve cryptography
- authentication protocol
- user authentication
- pervasive computing
- ciphertext
- standard model
- secret key
- service discovery
- intelligent systems
- peer to peer
- data management