Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones.
Daniel HugenrothAlberto SonninoSam CutlerAlastair R. BeresfordPublished in: Proc. Priv. Enhancing Technol. (2024)
Keyphrases
- authentication protocol
- private key
- security analysis
- high security
- public key
- secure communication
- secret key
- smart card
- mutual authentication
- key distribution
- cryptographic protocols
- security properties
- key exchange
- encryption scheme
- digital signature
- data encryption
- lightweight
- block cipher
- user authentication
- key management
- image encryption
- encryption decryption
- encryption key
- mobile devices
- authentication scheme
- public key cryptography
- digital rights management
- security mechanisms
- security requirements
- cryptographic algorithms
- rfid tags
- similarity measure
- advanced encryption standard