Secure and Computationally-Efficient Cryptographic Primitive based on Cellular Automation.
Rade VuckovacPublished in: CoRR (2019)
Keyphrases
- computationally efficient
- key management
- security protocols
- cryptographic protocols
- encryption key
- public key encryption
- security properties
- secure communication
- digital signature
- encryption scheme
- smart card
- stream cipher
- cryptographic algorithms
- security requirements
- public key cryptography
- cellular automata
- advanced encryption standard
- key distribution
- encryption decryption
- security analysis
- galois field
- block cipher
- security services
- security mechanisms
- diffie hellman
- wireless sensor networks
- homomorphic encryption
- ad hoc networks
- identity management
- secret key
- higher level
- authentication scheme
- hash functions
- security level
- high level
- authentication protocol
- formal model
- network security
- digital content