Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks.
Hristo BojinovDaniel SánchezPaul J. ReberDan BonehPatrick LincolnPublished in: USENIX Security Symposium (2012)
Keyphrases
- security protocols
- cryptographic algorithms
- advanced encryption standard
- cryptographic protocols
- security mechanisms
- encryption algorithms
- security services
- security properties
- key management
- security issues
- digital signature
- authentication protocol
- information security
- stream cipher
- human brain
- control algorithm
- smart card
- secure routing
- security threats
- low level
- resource constrained
- cellular automata
- public key cryptography
- secret key
- security requirements
- elliptic curve cryptography
- security measures
- chosen plaintext
- block cipher
- private key
- cognitive science
- user authentication
- public key
- rfid tags
- countermeasures
- wireless sensor networks
- security flaws
- high level