Combining message encryption and authentication.
Wojciech OszywaRafal GliwaPublished in: Ann. UMCS Informatica (2011)
Keyphrases
- encryption decryption
- identity authentication
- integrity verification
- image authentication
- public key cryptography
- security analysis
- data encryption
- virtual private network
- elliptic curve cryptography
- image encryption
- security mechanisms
- authentication scheme
- private key
- user authentication
- public key
- high security
- encryption algorithms
- digital signature