Reproducible Circularly-Secure Bit Encryption: Applications and Realizations.
Mohammad HajiabadiBruce M. KapronPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- advanced encryption standard
- block cipher
- key exchange
- encryption scheme
- key management
- data encryption
- encryption algorithms
- security properties
- security analysis
- digital signature
- s box
- encryption decryption
- cryptographic protocols
- stream cipher
- cryptographic algorithms
- integrity verification
- chaotic sequence
- encryption algorithm
- data confidentiality
- security requirements
- smart card
- image encryption
- standard model
- secret key
- digital rights management
- public key cryptography
- random variables
- wireless sensor networks
- private key
- security protocols
- data security
- secret sharing scheme
- diffie hellman
- hash functions
- encryption key
- public key
- pseudorandom
- fault model
- authentication scheme
- high security
- key distribution
- elliptic curve cryptography
- sensitive data
- identity authentication
- security issues
- secure communication
- protection schemes