Security Assessment of Software Security: A Closer Look at White-Box Cryptographic Implementations.
Joppe W. BosWil MichielsPublished in: ERCIM News (2016)
Keyphrases
- white box
- black box
- security protocols
- key management
- security properties
- smart card
- random number generators
- information security
- encryption scheme
- encryption decryption
- source code
- elliptic curve cryptography
- fuzzy vault
- high assurance
- cryptographic protocols
- security requirements
- public key cryptography
- risk assessment
- random number generator
- secure communication
- intrusion detection
- security mechanisms
- network security
- cryptographic algorithms
- high security
- security analysis
- encryption key
- security services
- access control
- stream cipher
- authentication protocol
- statistical databases
- security policies
- real world
- security level
- resource constrained
- public key
- security issues
- wireless sensor networks
- data integrity
- test data
- training data
- database systems
- protection schemes
- database
- source code metrics