Code-Based Game-Playing Proofs and the Security of Triple Encryption.
Mihir BellarePhillip RogawayPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- game playing
- encryption algorithms
- security properties
- encryption scheme
- encryption decryption
- key management
- high security
- encryption algorithm
- data encryption
- security analysis
- general game playing
- elliptic curve cryptography
- virtual private network
- private key
- world class
- digital rights management
- public key cryptography
- key exchange
- game tree
- video games
- security requirements
- game tree search
- multi player
- source code
- information security
- image encryption
- computer games
- integrity verification
- security issues
- secret key
- learning outcomes
- imperfect information
- data security
- game players
- elliptic curve
- standard model
- public key
- game play
- attitudes toward
- advanced encryption standard
- learning experience
- access control