Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers.
Florian UntersteinMarc SchinkThomas SchambergerLars TebelmannManuel IlgJohann HeyszlPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- key exchange
- authentication scheme
- image encryption
- security analysis
- hardware and software
- key exchange protocol
- secret key
- diffie hellman
- key distribution
- elliptic curve cryptography
- key management
- secure communication
- file system
- security properties
- encryption algorithm
- digital signature
- encryption scheme
- encryption algorithms
- multimedia streaming
- high security
- neural network
- password based authenticated key exchange