Limits on Authenticated Encryption Use in TLS.
Atul LuykxKenneth G. PatersonPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- key exchange
- security analysis
- authentication scheme
- secret key
- parameter estimation
- key exchange protocol
- encryption algorithms
- encryption algorithm
- encryption scheme
- image encryption
- key distribution
- elliptic curve cryptography
- diffie hellman
- key agreement protocol
- key management
- digital signature
- high security
- data sets
- digital rights management
- smart card
- standard model
- multimedia streaming