Transparent Memory Encryption and Authentication.
Mario WernerThomas UnterluggauerRobert SchillingDavid SchaffenrathStefan MangardPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- encryption decryption
- identity authentication
- data encryption
- image authentication
- public key cryptography
- integrity verification
- security analysis
- elliptic curve cryptography
- memory requirements
- user authentication
- virtual private network
- public key
- authentication scheme
- authentication protocol
- memory usage
- image encryption
- authentication mechanism
- key exchange
- secret key
- data security
- encryption algorithms
- encryption scheme
- elliptic curve
- memory space
- security model
- high security
- identity management
- security properties