Attacks and Security Proofs of EAX-Prime.
Kazuhiko MinematsuStefan LucksHiraku MoritaTetsu IwataPublished in: FSE (2013)
Keyphrases
- security threats
- security mechanisms
- security problems
- security measures
- computer security
- security protocols
- security risks
- security vulnerabilities
- countermeasures
- java card
- cyber attacks
- information security
- denial of service attacks
- security breaches
- stream cipher
- security issues
- security flaws
- fault injection
- chosen plaintext
- malicious users
- cryptographic protocols
- insider attacks
- security requirements
- malicious attacks
- intrusion prevention
- smart card
- access control
- biometric template
- network security
- theorem proving
- identity theft
- theorem prover
- dos attacks
- attack detection
- cryptographic algorithms
- secure routing
- intrusion detection
- resource constrained
- malicious activities
- intrusion detection system
- security properties
- security analysis
- unauthorized access
- security policies
- security management
- sensitive data
- key management
- sql injection
- intrusion detection and prevention