Improving the Security Bounds against Differential Attacks for Pholkos Family.
Nobuyuki TakeuchiKosei SakamotoTakuro ShirayaTakanori IsobePublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2024)
Keyphrases
- security threats
- security problems
- security mechanisms
- security protocols
- cyber attacks
- computer security
- security measures
- countermeasures
- information security
- java card
- security issues
- denial of service attacks
- security breaches
- cryptographic protocols
- malicious users
- security flaws
- security risks
- security vulnerabilities
- chosen plaintext
- security requirements
- upper bound
- fault injection
- identity theft
- intrusion detection
- cyber security
- lower bound
- special case
- cryptographic algorithms
- stream cipher
- malicious attacks
- key management
- access control
- intrusion prevention
- insider attacks
- biometric template
- security properties
- information leakage
- protection mechanisms
- security policies
- security management
- worst case
- rfid tags
- unauthorized access
- resource constrained
- network traffic
- dos attacks
- encryption algorithms
- wireless sensor networks
- secure routing
- ddos attacks
- network security
- intrusion detection and prevention