Secure Delegation of Isogeny Computations and Cryptographic Applications.
Robi PedersenOsmanbey UzunkolPublished in: CCSW@CCS (2019)
Keyphrases
- security protocols
- key management
- encryption key
- public key encryption
- cryptographic protocols
- secure communication
- security properties
- digital signature
- smart card
- encryption scheme
- access control
- security requirements
- stream cipher
- security mechanisms
- security analysis
- cryptographic algorithms
- conflict resolution
- advanced encryption standard
- authentication scheme
- homomorphic encryption
- public key
- trust relationships
- security policies
- encryption decryption
- public key cryptography
- security services
- data encryption
- lightweight
- block cipher
- authentication protocol
- sensitive data
- identity management
- security level
- key distribution
- access control systems
- access control policies
- elliptic curve cryptography
- resource constrained
- multi party
- trust model
- hash functions
- formal model