Login / Signup

Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model.

Shoichi HiroseHidenori KuwakadoHirotaka Yoshida
Published in: IEICE Trans. Inf. Syst. (2021)
Keyphrases
  • security analysis
  • security model
  • key exchange
  • formal model
  • security requirements
  • security properties
  • information systems
  • video sequences
  • software architecture
  • high security