Security Against Related Randomness Attacks via Reconstructive Extractors.
Kenneth G. PatersonJacob C. N. SchuldtDale L. SibbornHoeteck WeePublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- security problems
- computer security
- security threats
- security mechanisms
- security protocols
- intrusion detection
- access control
- security issues
- chosen plaintext
- cyber attacks
- security requirements
- security vulnerabilities
- java card
- security measures
- denial of service attacks
- information security
- fault injection
- identity theft
- security risks
- cryptographic protocols
- network security
- security policies
- security properties
- information leakage
- malicious users
- buffer overflow
- insider attacks
- intrusion prevention
- statistical databases