Honey Encryption Beyond Message Recovery Security.
Joseph JaegerThomas RistenpartQiang TangPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- encryption algorithms
- security properties
- encryption decryption
- encryption scheme
- key management
- high security
- identity authentication
- encryption algorithm
- data encryption
- security analysis
- digital rights management
- key exchange
- elliptic curve cryptography
- data security
- access control
- intrusion detection
- virtual private network
- security level
- information security
- security requirements
- stream cipher
- public key cryptography
- private key
- advanced encryption standard
- integrity verification
- security issues
- secret key
- image encryption
- security services
- ciphertext
- security protocols
- security model
- network security
- cryptographic algorithms
- wireless sensor networks
- block cipher
- pseudorandom