The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3.
Mihir BellareBjörn TackmannPublished in: CRYPTO (1) (2016)
Keyphrases
- multi user
- encryption algorithms
- key exchange
- advanced encryption standard
- encryption algorithm
- encryption decryption
- secret key
- cryptographic algorithms
- authentication scheme
- data encryption standard
- key distribution
- virtual environment
- private key
- diffie hellman
- key exchange protocol
- encryption scheme
- elliptic curve cryptography
- security properties
- security analysis
- augmented reality
- image encryption
- key agreement protocol
- key management
- virtual world
- multi granularity
- high security
- user interface
- security level
- block cipher
- security protocols
- data encryption
- data security
- multiple users
- secure communication
- password based authenticated key exchange
- smart card
- single user
- public key
- s box
- authentication protocol
- security mechanisms
- collaborative writing
- public key cryptography
- virtual reality
- pseudorandom
- virtual private network
- security issues
- security requirements
- access control
- elliptic curve
- data confidentiality
- digital signature
- fault model
- cryptographic protocols