Login / Signup

Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper).

Guozhen LiuMohona GhoshLing Song
Published in: IACR Trans. Symmetric Cryptol. (2017)
Keyphrases
  • security analysis
  • security requirements
  • smart card
  • public key
  • security model
  • high security
  • user authentication
  • authentication protocol
  • security properties
  • proxy signature scheme