Attacks Against the INDCPA-D Security of Exact FHE Schemes.
Jung Hee CheonHyeongmin ChoeAlain PasselègueDamien StehléElias SuvantoPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- security threats
- security mechanisms
- security problems
- security measures
- security protocols
- computer security
- cryptographic algorithms
- cryptographic protocols
- cyber attacks
- java card
- security vulnerabilities
- security breaches
- security flaws
- countermeasures
- denial of service attacks
- security issues
- information security
- chosen plaintext
- stream cipher
- fault injection
- security risks
- access control
- protection schemes
- network security
- malicious attacks
- security policies
- security requirements
- malicious users
- key agreement
- resource constrained
- provably secure
- key management
- intrusion detection and prevention
- key management scheme
- intrusion prevention
- insider attacks
- secure routing
- buffer overflow
- security properties
- biometric template
- security management
- authentication scheme
- unauthorized access
- cyber security
- security model
- sql injection
- intrusion detection
- attack scenarios
- attack detection
- smart card
- block cipher