Secure and Fast Implementations of Two Involution Ciphers.
Billy Bob BrumleyPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- stream cipher
- chosen plaintext
- block cipher
- security protocols
- security issues
- secret key
- advanced encryption standard
- security requirements
- security analysis
- authentication protocol
- hash functions
- key management
- highly efficient
- parallel implementations
- security management
- data sets
- data mining
- security measures
- efficient implementation
- cryptographic protocols
- pseudorandom
- database