Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption.
Eik ListMridul NandiPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- key exchange
- security analysis
- key exchange protocol
- diffie hellman
- key distribution
- key management
- encryption scheme
- authentication scheme
- data encryption
- digital signature
- key agreement protocol
- secret key
- secure communication
- query expansion
- pseudo relevance feedback
- image encryption
- security properties
- public key cryptography
- private key
- standard model
- public key
- security requirements
- signature scheme
- encryption decryption
- cryptographic protocols
- high security
- group communication
- elliptic curve
- document retrieval