Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones.
Daniel HugenrothAlberto SonninoSam CutlerAlastair R. BeresfordPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- authentication protocol
- private key
- security analysis
- secret key
- secure communication
- high security
- public key
- cryptographic protocols
- mutual authentication
- encryption scheme
- key exchange
- key management
- smart card
- digital signature
- image encryption
- user authentication
- authentication scheme
- stream cipher
- block cipher
- mobile devices
- security properties
- data encryption
- security protocols
- diffie hellman
- security requirements
- information systems
- encryption decryption
- ciphertext
- standard model
- signature scheme
- cryptographic algorithms
- encryption key