Hardware-based attacks to compromise the cryptographic security of an election system.
Mohammad-Mahdi BidmeshkiGaurav Rajavendra ReddyLiwei ZhouJeyavijayan RajendranYiorgos MakrisPublished in: ICCD (2016)
Keyphrases
- security protocols
- advanced encryption standard
- protection schemes
- random number generator
- cryptographic protocols
- smart card
- java card
- cryptographic algorithms
- stream cipher
- security mechanisms
- encryption algorithms
- security properties
- security threats
- access control
- key management
- security problems
- privacy protection
- security measures
- low cost
- elliptic curve cryptography
- s box
- secure communication
- computer security
- fault injection
- cyber attacks
- countermeasures
- differential power analysis
- random number
- denial of service attacks
- digital watermark
- information security
- encryption decryption
- authentication protocol
- security requirements
- computer systems
- security vulnerabilities
- security breaches
- block cipher
- rfid tags
- digital signature
- wireless sensor networks
- chosen plaintext
- security issues
- malicious users
- encryption key
- security risks
- private key
- encryption scheme
- secret key