Login / Signup
Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model.
Shoichi Hirose
Hidenori Kuwakado
Hirotaka Yoshida
Published in:
IEICE Trans. Inf. Syst. (2021)
Keyphrases
</>
security analysis
security model
key exchange
formal model
security requirements
security properties
information systems
video sequences
software architecture
high security