Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Marcel MedwedFrançois-Xavier StandaertVentzislav NikovMartin FeldhoferPublished in: ASIACRYPT (1) (2016)
Keyphrases
- information leakage
- security threats
- security problems
- security mechanisms
- computer security
- security vulnerabilities
- security protocols
- security measures
- java card
- security issues
- cyber attacks
- countermeasures
- denial of service attacks
- stream cipher
- fault injection
- personal information
- intrusion detection
- security flaws
- security risks
- information security
- malicious users
- cryptographic algorithms
- malicious attacks
- secure routing
- access control
- security breaches
- buffer overflow
- pseudo relevance feedback
- security policies
- cryptographic protocols
- security requirements
- biometric template
- chosen plaintext
- security architecture
- dos attacks
- key management
- computer networks
- smart card
- query expansion
- defense mechanisms
- sql injection
- information retrieval