Perspectives for cryptographic long-term security.
Johannes BuchmannAlexander MayUlrich VollmerPublished in: Commun. ACM (2006)
Keyphrases
- long term
- security protocols
- key management
- security properties
- short term
- encryption decryption
- cryptographic protocols
- smart card
- encryption scheme
- random number generator
- security requirements
- fuzzy vault
- secure communication
- information security
- cryptographic algorithms
- elliptic curve cryptography
- security services
- access control
- data security
- network security
- security analysis
- security mechanisms
- encryption key
- high assurance
- public key encryption
- stream cipher
- security policies
- ad hoc networks
- intrusion detection
- key distribution
- security problems
- security issues