Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks.
Evgenios M. KornaropoulosCharalampos PapamanthouRoberto TamassiaPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- information leakage
- security threats
- security problems
- security mechanisms
- security protocols
- security measures
- computer security
- java card
- security risks
- encryption decryption
- countermeasures
- cyber attacks
- security flaws
- information security
- security vulnerabilities
- malicious users
- security breaches
- security issues
- chosen plaintext
- fault injection
- biometric template
- encryption algorithm
- encryption scheme
- stream cipher
- denial of service attacks
- data security
- personal information
- cryptographic protocols
- security requirements
- malicious attacks
- network security
- stepping stones
- access control
- identity theft
- secure routing
- intrusion detection
- intrusion detection and prevention
- key management
- cryptographic algorithms
- encryption key
- malicious nodes
- smart card
- intrusion prevention
- cyber security