GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte.
Shay GueronYehuda LindellPublished in: CCS (2015)
Keyphrases
- key exchange
- security analysis
- key exchange protocol
- anomaly detection
- error correcting codes
- encryption scheme
- authentication scheme
- encryption algorithms
- secret key
- key management
- digital signature
- image encryption
- diffie hellman
- intrusion detection system
- secure communication
- countermeasures
- encryption algorithm