Unshared Secret Key Cryptography: Finite Constellation Inputs and Ideal Secrecy Outage.
Shuiyin LiuYi HongEmanuele ViterboPublished in: CoRR (2014)
Keyphrases
- secret key
- key distribution
- key management
- session key
- mutual authentication
- smart card
- public key
- authentication scheme
- secure communication
- pseudorandom
- security level
- information security
- security analysis
- group communication
- public key cryptography
- stream cipher
- diffie hellman
- private key
- encryption scheme
- authentication protocol
- hash functions
- ciphertext
- real time
- key exchange
- key management scheme
- key establishment