The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Yusuke NaitoYu SasakiTakeshi SugawaraKan YasudaPublished in: CCS (2022)
Keyphrases
- multi user
- encryption algorithms
- network connection
- encryption scheme
- high security
- access control
- security properties
- information security
- security issues
- security analysis
- encryption decryption
- virtual environment
- statistical databases
- security requirements
- network security
- virtual world
- cryptographic algorithms
- encryption algorithm
- elliptic curve cryptography
- data encryption
- key management
- augmented reality
- key exchange
- user interface
- multiple access
- intrusion detection
- image encryption
- single user
- key distribution
- situational awareness
- computer vision
- security policies