From Stream to Provably Secure Block Ciphers Base on Pseudorandom Mastic Transformations.
Yassin M. Y. HasanPublished in: Egypt. Comput. Sci. J. (2007)
Keyphrases
- secret key
- provably secure
- pseudorandom
- block cipher
- key management
- public key
- hash functions
- diffie hellman
- signature scheme
- encryption scheme
- smart card
- security model
- security analysis
- data streams
- standard model
- real time
- private key
- ciphertext
- data sets
- uniformly distributed
- data distribution
- rfid tags
- end to end
- low cost