Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption.
Jooyoung LeePublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- high security
- encryption algorithms
- private key
- data encryption standard
- encryption scheme
- image encryption
- encryption decryption
- security properties
- key management
- security analysis
- encryption algorithm
- data encryption
- key exchange
- public key
- identity authentication
- elliptic curve cryptography
- data confidentiality
- secure communication
- digital rights management
- block cipher
- virtual private network
- cryptographic algorithms
- integrity verification
- security requirements
- stream cipher
- security protocols
- secret key
- diffie hellman
- data security
- mutual authentication
- cryptographic protocols
- data sharing
- packet size
- advanced encryption standard
- information security
- intrusion detection
- key establishment
- smart card
- data protection
- data quality
- digital signature
- ciphertext
- network communication
- secret sharing scheme
- secret sharing
- optimal solution