Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
Luka MusicCéline ChevalierElham KashefiPublished in: ProvSec (2020)
Keyphrases
- security model
- countermeasures
- malicious users
- attack detection
- security requirements
- public key
- access control
- ddos attacks
- denial of service attacks
- security analysis
- information security
- cyber attacks
- attack scenarios
- dos attacks
- security architecture
- data corruption
- block cipher
- authentication protocol
- detecting malicious
- security mechanisms
- security problems
- designated verifier
- provably secure
- secret key
- cryptographic protocols
- watermarking scheme
- lightweight
- public key cryptography
- encryption scheme
- security policies
- private key
- security properties
- security protocols
- distributed denial of service attacks