On the Practical Security of a Leakage Resilient Masking Scheme.
Emmanuel ProuffMatthieu RivainThomas RochePublished in: CT-RSA (2014)
Keyphrases
- information security
- computer security
- access control
- digital signature scheme
- network security
- protection scheme
- key distribution
- real world
- public key cryptosystem
- key exchange
- identity based cryptography
- key agreement
- authentication mechanism
- wireless local area network
- information leakage
- provably secure
- user authentication
- human visual system
- security policies
- security model
- authentication scheme
- key management scheme
- chosen plaintext
- intrusion detection
- security issues
- security requirements
- electronic voting
- public key
- authentication protocol
- graphical password
- signcryption scheme
- key agreement protocol
- trusted third party
- private key