Performance Bounds on the Security of Transform-Based Analog Encryption.
Theodoros TsiligkaridisPublished in: WCNC (2017)
Keyphrases
- encryption algorithms
- security properties
- key management
- encryption scheme
- encryption algorithm
- encryption decryption
- high security
- data encryption
- key exchange
- security analysis
- information security
- identity authentication
- security requirements
- access control
- public key cryptography
- digital rights management
- cryptographic protocols
- image encryption
- elliptic curve cryptography
- virtual private network
- data confidentiality
- stream cipher
- network security
- mutual authentication
- security policies
- lower bound
- upper bound
- security level
- private key
- secret key
- statistical databases
- integrity verification
- worst case
- public key
- data security
- elliptic curve
- security issues
- network communication
- authentication scheme
- security mechanisms
- public key infrastructure
- data quality
- privacy preserving
- cryptographic algorithms
- security protocols
- security systems
- ciphertext