Second-Order SCA Security with almost no Fresh Randomness.
Aein Rezaei ShahmirzadiAmir MoradiPublished in: IACR Trans. Cryptogr. Hardw. Embed. Syst. (2021)
Keyphrases
- intrusion detection
- network security
- higher order
- security issues
- information security
- access control
- security systems
- security policies
- security properties
- computer security
- key management
- security mechanisms
- data security
- high order
- security vulnerabilities
- case study
- data sets
- information assurance
- security level
- security problems
- real time
- security analysis
- security requirements
- biometric systems
- rfid tags
- intrusion detection system
- distributed systems
- low cost
- information systems