Bit Security Estimation for Leakage-Prone Key Establishment Schemes.
Marcus de ReeGeorgios MantasJonathan RodriguezPublished in: IEEE Commun. Lett. (2023)
Keyphrases
- key establishment
- key management
- sensor networks
- wireless sensor networks
- key management scheme
- pairwise
- provably secure
- secret key
- protection schemes
- intrusion detection
- ad hoc networks
- key distribution
- pseudorandom
- sensor nodes
- statistical databases
- security requirements
- public key
- information security
- data security
- secret sharing scheme
- security protocols
- distributed systems
- access control
- smart card
- resource constrained
- hash functions