Masking Proofs Are Tight and How to Exploit it in Security Evaluations.
Vincent GrossoFrançois-Xavier StandaertPublished in: EUROCRYPT (2) (2018)
Keyphrases
- security issues
- security requirements
- upper bound
- lower bound
- access control
- security policies
- information assurance
- intrusion detection
- information security
- network security
- theorem proving
- security mechanisms
- worst case
- human visual system
- database systems
- key management
- network management
- anomaly detection
- data integrity
- data security
- security systems
- neural network
- formal proofs
- mathematical proofs