Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis.
Jean-Baptiste BedruneEric FiliolFrédéric RaynalPublished in: J. Comput. Virol. (2010)
Keyphrases
- countermeasures
- information security
- block cipher
- cellular automata
- malicious users
- cryptographic algorithms
- attack detection
- differential power analysis
- malicious attacks
- secret key
- security risks
- denial of service attacks
- security issues
- fault injection
- smart card
- power analysis
- security vulnerabilities
- data corruption
- intrusion detection
- ddos attacks
- detecting malicious
- attack scenarios
- encryption algorithms
- network attacks
- network security
- network intrusion
- hash functions
- security measures
- dos attacks