1. AES seems weak. 2. Linear time secure cryptography.
Warren D. SmithPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- cryptographic algorithms
- advanced encryption standard
- security protocols
- encryption algorithms
- elliptic curve cryptography
- security mechanisms
- biometric data
- private key
- authentication scheme
- block cipher
- public key
- security issues
- key management
- cryptographic protocols
- secure communication
- public key cryptography
- data encryption
- security analysis
- digital signature
- data structure
- security services
- information security
- cellular automata
- worst case