Provable-Security Analysis of Authenticated Encryption in Kerberos.
Alexandra BoldyrevaVirendra KumarPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- security analysis
- key exchange
- mutual authentication
- authentication protocol
- authentication scheme
- public key
- security requirements
- smart card
- security properties
- high security
- image encryption
- encryption scheme
- key exchange protocol
- security model
- encryption algorithm
- secret key
- user authentication
- elliptic curve cryptography
- lightweight
- diffie hellman
- stream cipher
- digital signature
- information systems
- access control policies
- cost effective
- image compression