On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks.
Christoph DobraunigMaria EichlsederStefan MangardFlorian MendelPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- countermeasures
- fault injection
- java card
- information security
- security measures
- smart card
- security threats
- security mechanisms
- cyber attacks
- security problems
- security protocols
- denial of service attacks
- stream cipher
- security issues
- computer security
- security risks
- security breaches
- fault model
- security vulnerabilities
- power analysis
- chosen plaintext
- malicious users
- security flaws
- access control
- fault detection
- malicious attacks
- fault diagnosis
- cryptographic algorithms
- secret key
- security requirements
- information leakage
- insider attacks
- security management
- cryptographic protocols
- network security
- biometric template
- resource constrained
- intrusion detection
- unauthorized access
- secure routing
- defense mechanisms
- computer networks
- attack detection
- block cipher
- dos attacks
- data corruption
- cyber security
- buffer overflow
- sql injection