Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption.
Bart MenninkReza ReyhanitabarDamian VizárPublished in: ASIACRYPT (2) (2015)
Keyphrases
- key exchange
- encryption algorithms
- encryption scheme
- key management
- high security
- encryption decryption
- key exchange protocol
- key agreement protocol
- secret key
- key distribution
- state space
- security properties
- elliptic curve cryptography
- data encryption
- authentication scheme
- security issues
- information security
- access control
- security analysis
- security policies
- intrusion detection
- private key
- image encryption
- encryption algorithm
- identity authentication
- security requirements
- mutual authentication