Login / Signup
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications.
Kasper Bonne Rasmussen
Paolo Gasti
Published in:
PST (2018)
Keyphrases
</>
key exchange
authentication protocol
authentication scheme
secret key
key distribution
security analysis
security properties
image encryption
encryption algorithms
smart card
cryptographic protocols
low cost
security requirements
key exchange protocol