SHAMROCK: self contained cryptography and key management processor.
Daniil M. UtinRoger KhazanJoshua KramerMichael VaiDavid WhelihanPublished in: CCS (2013)
Keyphrases
- key management
- symmetric key
- key distribution
- ad hoc networks
- wireless sensor networks
- resource constrained
- security threats
- key management scheme
- secret sharing scheme
- provably secure
- digital signature
- group communication
- security protocols
- public key cryptography
- security services
- identity based cryptography
- secure communication
- information security
- diffie hellman
- elliptic curve
- secret key
- cryptographic protocols
- data streams