Login / Signup
Security Analysis of SKINNY under Related-Tweakey Settings.
Guozhen Liu
Mohona Ghosh
Song Ling
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
security analysis
public key
image encryption
security requirements
security properties
smart card
encryption scheme
security model
authentication protocol
encryption algorithm
user authentication
high security