Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks.
Thorben MoosSayandeep SahaFrançois-Xavier StandaertPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- security threats
- security problems
- security mechanisms
- security measures
- security protocols
- computer security
- java card
- security vulnerabilities
- countermeasures
- fault injection
- security breaches
- security issues
- information security
- denial of service attacks
- cyber attacks
- fault model
- chosen plaintext
- fault diagnosis
- malicious users
- malicious attacks
- security risks
- security requirements
- cryptographic algorithms
- insider attacks
- security flaws
- fault detection
- network security
- intrusion detection
- stream cipher
- identity theft
- access control
- security properties
- security management
- attack scenarios
- attack detection
- anomaly detection
- encryption scheme
- smart card
- human visual system
- cryptographic protocols
- sensitive data
- cyber security
- unauthorized access
- security policies
- secure routing
- sql injection
- resource constrained
- intrusion detection and prevention
- security analysis