Masking Proofs are Tight (and How to Exploit it in Security Evaluations).
Vincent GrossoFrançois-Xavier StandaertPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- information security
- lower bound
- security threats
- upper bound
- security issues
- security systems
- intrusion detection
- network security
- security requirements
- access control
- cyber security
- theorem proving
- information assurance
- security policies
- statistical databases
- security management
- key management
- computer security
- formal proofs
- wireless sensor networks
- security level
- security analysis
- security mechanisms
- neural network
- computer networks