Login / Signup
Security analysis of CLEFIA-128.
Siavash Ahmadi
Mahshid Delavar
Javad Mohajeri
Mohammad Reza Aref
Published in:
ISCISC (2014)
Keyphrases
</>
security analysis
security requirements
smart card
public key
authentication protocol
security model
high security
security properties
user authentication
image encryption
encryption scheme
encryption algorithm
proxy signature scheme
mutual authentication
operating system
source code
e government