Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks.
Boris KöpfGeoffrey SmithPublished in: CSF (2010)
Keyphrases
- buffer overflow
- information leakage
- security risks
- denial of service
- cryptographic algorithms
- security vulnerabilities
- dos attacks
- cellular automata
- upper bound
- information security
- countermeasures
- lower bound
- cryptographic protocols
- denial of service attacks
- security threats
- malicious attacks
- personal information
- missing data
- worst case
- security mechanisms
- traffic analysis
- watermarking scheme
- lower and upper bounds
- terrorist attacks
- attack detection
- malicious users
- attack graphs
- information systems
- upper and lower bounds
- intrusion detection