Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation.
Yusai WuLiqing YuZhenfu CaoXiaolei DongPublished in: ASIACRYPT (1) (2020)
Keyphrases
- security analysis
- high security
- image encryption
- encryption algorithm
- encryption scheme
- block cipher
- private key
- stream cipher
- public key
- smart card
- security requirements
- authentication protocol
- security properties
- mutual authentication
- authentication scheme
- lightweight
- user authentication
- secret sharing scheme
- software engineering