Key Assignment Scheme with Authenticated Encryption.
Suyash KandeleSouradyuti PaulPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- key exchange
- private key
- key distribution
- secure communication
- high security
- authentication scheme
- key management
- key exchange protocol
- image encryption
- diffie hellman
- secret key
- public key
- elliptic curve cryptography
- security analysis
- signature scheme
- elliptic curve
- neural network
- provably secure
- encryption algorithm
- encryption key
- data encryption standard
- group communication
- digital signature
- chaotic systems
- standard model
- classification scheme
- fault tolerant
- smart card