Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks.
Ekawat HomsirikamolPawel MorawieckiMarcin RogawskiMarian SrebrnyPublished in: CISIM (2012)
Keyphrases
- security mechanisms
- security threats
- security protocols
- computer security
- security measures
- security problems
- java card
- security flaws
- information security
- countermeasures
- security issues
- security vulnerabilities
- security breaches
- denial of service attacks
- security risks
- cyber attacks
- stream cipher
- fault injection
- security requirements
- answer set programming
- network security
- intrusion detection
- secure routing
- chosen plaintext
- training set
- malicious attacks
- security analysis
- sat solvers
- access control