Random Probing Security: Verification, Composition, Expansion and New Constructions.
Sonia BelaïdJean-Sébastien CoronEmmanuel ProuffMatthieu RivainAbdul Rahman TalebPublished in: CRYPTO (1) (2020)
Keyphrases
- high security
- java card
- cryptographic protocols
- integrity verification
- information security
- security requirements
- security issues
- information assurance
- security policies
- key management
- network security
- chosen plaintext
- security analysis
- biometric systems
- statistical databases
- smart card
- intrusion detection
- security model
- image encryption
- high assurance
- security protocols
- cyber security
- signature verification
- access control
- security mechanisms
- security level
- security systems
- database
- sensitive data
- model checking
- cloud computing
- database systems
- data mining