Login / Signup
Exact Security Analysis of ASCON.
Bishwajit Chakraborty
Chandranan Dhar
Mridul Nandi
Published in:
ASIACRYPT (3) (2023)
Keyphrases
</>
security analysis
public key
security requirements
smart card
high security
security model
encryption scheme
security properties
authentication protocol
encryption algorithm
image encryption
database systems
private key
access control policies
user authentication
authentication scheme