From stream to provably secure block ciphers based on pseudorandom matrix transformations.
Yassin M. HasanPublished in: COMSWARE (2008)
Keyphrases
- secret key
- provably secure
- pseudorandom
- block cipher
- key management
- public key
- hash functions
- diffie hellman
- signature scheme
- encryption scheme
- smart card
- security model
- data streams
- security analysis
- standard model
- private key
- uniformly distributed
- real time
- data sets
- data distribution
- ciphertext
- similarity search
- end to end