Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios.
Sevdenur BalogluSergiu BursucSjouke MauwJun PangPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- security threats
- security mechanisms
- security properties
- security protocols
- security problems
- security vulnerabilities
- cyber attacks
- security measures
- computer security
- java card
- information security
- countermeasures
- cryptographic protocols
- security issues
- security risks
- security requirements
- security breaches
- chosen plaintext
- security flaws
- denial of service attacks
- automated theorem provers
- human operators
- malicious users
- access control
- fault injection
- stream cipher
- malicious attacks
- secure routing
- identity theft
- information leakage
- cryptographic algorithms
- intrusion detection and prevention
- network security
- biometric template
- insider attacks
- intrusion detection
- security policies
- security analysis
- smart card
- cyber security
- intrusion detection system
- malicious nodes
- theorem prover
- authentication scheme
- intrusion prevention
- secret key
- sensitive data
- buffer overflow
- encryption algorithms
- security management
- unauthorized access
- computer networks