GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks.
Mihir BellareAdriana PalacioPublished in: CRYPTO (2002)
Keyphrases
- smart card
- java card
- security mechanisms
- security threats
- security analysis
- authentication protocol
- security problems
- security protocols
- cryptographic protocols
- information security
- security measures
- security requirements
- fault injection
- cryptographic algorithms
- countermeasures
- computer security
- security issues
- denial of service attacks
- stream cipher
- cyber attacks
- security breaches
- security risks
- security vulnerabilities
- malicious users
- protection schemes
- security properties
- security flaws
- malicious attacks
- key management
- key agreement
- insider attacks
- access control
- chosen plaintext
- intrusion prevention
- key management scheme
- buffer overflow
- lightweight
- network security
- watermarking scheme
- public key
- resource constrained
- unauthorized access
- encryption scheme
- security model
- provably secure
- identity theft
- biometric template
- authentication scheme
- secure routing
- intrusion detection