Главная
Study mode:
on
1
Intro
2
Key Rotation Approaches
3
Hybrid Approach
4
Status
5
Confidentiality
6
Secret Sharing
7
Attack Models
8
Reintroduction
9
Bug in Proof
10
Performance
11
Conclusion
Description:
Explore a comprehensive analysis of key rotation techniques for authenticated encryption in this conference talk presented at Crypto 2017. Delve into various key rotation approaches, including a hybrid method, and examine their implications for confidentiality and security. Investigate the use of secret sharing in key management, and understand different attack models relevant to authenticated encryption systems. Learn about a discovered bug in the proof and its significance. Evaluate the performance aspects of key rotation strategies and gain insights into their practical implementation. Conclude with a summary of key findings and their relevance to the field of cryptography.

Key Rotation for Authenticated Encryption

TheIACR
Add to list