LPN-based Attacks in the White-box Setting.
Alex CharlèsAleksei UdovenkoPublished in: IACR Trans. Cryptogr. Hardw. Embed. Syst. (2023)
Keyphrases
- white box
- black box
- source code
- countermeasures
- data sets
- malicious users
- traffic analysis
- software systems
- cooperative
- malicious attacks
- java card
- source code metrics
- database
- data mining
- terrorist attacks
- denial of service attacks
- machine learning
- security threats
- privacy preserving
- dos attacks
- computer security
- security mechanisms
- case study
- watermarking scheme
- intrusion detection