Generalized Security Analysis of the Random Key Bits Leakage Attack.
Jun KogureNoboru KunihiroHirosuke YamamotoPublished in: WISA (2011)
Keyphrases
- security analysis
- high security
- authentication protocol
- encryption algorithm
- private key
- security requirements
- public key
- smart card
- block cipher
- encryption scheme
- security model
- secret key
- defense mechanisms
- image encryption
- security properties
- password guessing
- secure communication
- mutual authentication
- user authentication
- pseudorandom