Provable Security Against Decryption Failure Attacks from LWE.
Christian MajenzFabrizio SisinniPublished in: CRYPTO (2) (2024)
Keyphrases
- unauthorized access
- security threats
- security mechanisms
- encryption scheme
- security protocols
- security problems
- security measures
- computer security
- cyber attacks
- countermeasures
- access control
- java card
- security vulnerabilities
- information security
- denial of service attacks
- security breaches
- secure communication
- stream cipher
- security issues
- encryption decryption
- security policies
- encryption algorithm
- security flaws
- malicious users
- chosen plaintext
- cryptographic protocols
- security risks
- secret key
- cryptographic algorithms
- security requirements
- information leakage
- network security
- intrusion detection
- malicious attacks
- fault injection
- biometric template
- intrusion prevention
- block cipher
- intrusion detection system
- buffer overflow
- intrusion detection and prevention
- sensitive data
- security analysis
- security management
- dos attacks
- malicious nodes
- identity theft
- cyber security
- insider attacks
- secure routing
- key management
- wireless sensor networks
- resource constrained
- authentication protocol
- ad hoc networks