Hardware Implementations of Pairings at Updated Security Levels.
Arthur LaviceNadia El MrabetAlexandre BerzatiJean-Baptiste RigaudJulien ProyPublished in: CARDIS (2021)
Keyphrases
- information security
- security vulnerabilities
- intrusion detection
- information assurance
- security issues
- security threats
- security properties
- data security
- high levels
- security requirements
- lower levels
- key management
- real time
- access control
- case study
- genetic algorithm
- security mechanisms
- security protocols
- security policies
- security systems
- distributed systems
- security management
- website