Safe and Secure? On the Timing Analysability of Cryptographic Implementations.
Alexander StegmeierPeter KnauerPhilipp SchubaurChristian PiatkaDominik MerliSebastian AltmeyerPublished in: RTAS (2024)
Keyphrases
- key management
- security protocols
- encryption key
- cryptographic protocols
- public key encryption
- encryption scheme
- security properties
- secure communication
- digital signature
- smart card
- random number generators
- stream cipher
- public key cryptography
- security requirements
- cryptographic algorithms
- security analysis
- advanced encryption standard
- key distribution
- homomorphic encryption
- efficient implementation
- asynchronous circuits
- standard model
- proxy re encryption
- public key
- security issues
- authentication protocol
- security services
- identity management
- security mechanisms
- secret key
- secret sharing
- distributed systems
- resource constrained
- encryption decryption
- multi party
- digital content
- hash functions
- formal model
- lightweight