Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search.
Shuaigang LiXianhui LuJiang ZhangBao LiLei BiPublished in: ICICS (2) (2021)
Keyphrases
- binary search
- security measures
- key exchange protocol
- cyber attacks
- security vulnerabilities
- fault injection
- information security
- denial of service attacks
- countermeasures
- authentication mechanism
- security requirements
- security policies
- malicious users
- security risks
- security management
- access control
- security problems
- encryption algorithm
- authentication protocol
- malicious attacks
- computer security
- security mechanisms
- ddos attacks
- dos attacks
- cyber security
- network security
- key agreement
- information leakage
- security threats
- attack scenarios
- block cipher
- security properties
- key management
- security issues
- statistical databases
- intrusion detection
- key agreement protocol
- denial of service
- forensic analysis
- data encryption
- secret key
- encryption decryption
- buffer overflow