Building Secure Cryptographic Transforms, or How to Encrypt and MAC.
Tadayoshi KohnoAdriana PalacioJohn BlackPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- key management
- encryption scheme
- encryption decryption
- stream cipher
- security protocols
- sensitive data
- secure communication
- secret key
- cryptographic protocols
- smart card
- key distribution
- ad hoc networks
- resource constrained
- security analysis
- public key encryption
- digital signature
- cryptographic algorithms
- wireless sensor networks
- ciphertext
- secret sharing scheme
- public key
- security properties
- provably secure
- standard model
- hash functions
- encryption key
- block cipher
- security model
- security services
- encryption algorithm
- security mechanisms
- security issues
- privacy preserving
- lightweight