Login / Signup
How Secure is AES Under Leakage.
Andrey Bogdanov
Takanori Isobe
Published in:
ASIACRYPT (2) (2015)
Keyphrases
</>
advanced encryption standard
cryptographic algorithms
information leakage
block cipher
secret key
key management
security issues
security protocols
personal information
data encryption
key distribution
private key
low cost
authentication scheme
security level
encryption algorithm
digital signature
secure communication
key exchange
fault model
security analysis
resource constrained
public key
covert channel
database