Inspec keywords: public key cryptography

Other keywords: MAC construction; hidden identity weak hash proof system; public key setting; leakage resilient MAC; security properties; leakage bound; leakage resilient message authentication code scheme; HID-wHPS; verification query attack

Subjects: Data security; Cryptography