On the Security of LWE Cryptosystem against Subversion Attacks.
Zhichao YangRongmao ChenChao LiLongjiang QuGuomin YangPublished in: Comput. J. (2020)
Keyphrases
- security threats
- public key cryptosystem
- security problems
- java card
- security mechanisms
- security measures
- elliptic curve
- security vulnerabilities
- computer security
- security protocols
- countermeasures
- cyber attacks
- security breaches
- information security
- power analysis
- security issues
- private key
- chosen plaintext
- security risks
- stream cipher
- denial of service attacks
- cryptographic protocols
- security flaws
- fault injection
- malicious attacks
- malicious users
- intrusion detection
- smart card
- network security
- cellular automata
- biometric template
- security requirements
- secure routing
- access control
- information leakage
- public key
- key management
- security analysis
- buffer overflow
- sql injection
- security policies
- sensitive data
- cyber security
- encryption algorithm
- key distribution
- dos attacks
- standard model
- malicious nodes
- identity theft
- signature scheme
- secret key
- advanced encryption standard
- cca secure
- data security
- intrusion detection and prevention
- critical infrastructure