Login / Signup
A Modular Approach to the Security Analysis of Two-Permutation Constructions.
Yu Long Chen
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
security analysis
smart card
high security
public key
security model
security requirements
security properties
authentication protocol
mutual authentication
image encryption
user authentication
encryption scheme
encryption algorithm
private key
multiresolution
high dimensional
intrusion detection
peer to peer