Login / Signup
Security Analysis of MISTY1.
Hidema Tanaka
Yasuo Hatano
Nobuyuki Sugio
Toshinobu Kaneko
Published in:
WISA (2007)
Keyphrases
</>
security analysis
public key
smart card
high security
security requirements
security properties
security model
image encryption
user authentication
encryption scheme
authentication protocol
encryption algorithm
real time
mutual authentication
proxy signature scheme
data mining
databases