Login / Signup
Security Analysis of BLAKE2's Modes of Operation.
Atul Luykx
Bart Mennink
Samuel Neves
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
security analysis
security requirements
smart card
public key
high security
security properties
security model
image encryption
authentication protocol
user authentication
key exchange
encryption algorithm
encryption scheme
private key
mutual authentication
elliptic curve cryptography
proxy signature scheme