Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks.
Qiqi LaiFeng-Hao LiuZhedong WangPublished in: Public Key Cryptography (1) (2021)
Keyphrases
- cryptographic protocols
- high security
- security mechanisms
- security threats
- security protocols
- security problems
- computer security
- security measures
- block cipher
- countermeasures
- security vulnerabilities
- security breaches
- stream cipher
- information security
- denial of service attacks
- security flaws
- malicious attacks
- network security
- fault injection
- cyber attacks
- chosen plaintext
- security requirements
- encryption scheme
- java card
- cryptographic algorithms
- security issues
- security analysis
- secure communication
- security risks
- noisy channel
- malicious users
- privacy preserving
- information leakage
- secure routing
- attack scenarios
- private key
- anomaly detection
- intrusion detection
- buffer overflow
- image encryption
- biometric template
- security policies
- security properties