On the security of blockwise secure modes of operation beyond the birthday bound.
Antoine JouxPublished in: IEEE Trans. Inf. Theory (2010)
Keyphrases
- security requirements
- security issues
- security measures
- security level
- key management
- security mechanisms
- security management
- security properties
- security analysis
- data encryption
- information security
- sensitive data
- cryptographic protocols
- electronic voting
- security protocols
- data security
- stream cipher
- authentication mechanism
- security model
- upper bound
- user authentication
- access control
- security architecture
- authentication protocol
- key exchange protocol
- digital signature scheme
- high security
- security services
- key agreement protocol
- diffie hellman
- public key encryption
- security policies
- authentication scheme
- key distribution
- key agreement
- smart card
- encryption scheme
- identity management
- trusted computing
- rfid systems
- public key cryptosystems
- key exchange
- integrity verification
- secure communication
- lower bound
- public key cryptosystem
- electronic payment
- private key
- security patterns
- digital rights management
- provably secure
- secret key
- public key infrastructure
- intrusion detection
- unauthorized access
- previously mentioned
- secure multiparty computation
- factor authentication
- mobile agent system
- modular exponentiation
- homomorphic encryption
- intrusion detection system
- information leakage
- key management scheme