Lest We Remember: Cold Boot Attacks on Encryption Keys.
J. Alex HaldermanSeth D. SchoenNadia HeningerWilliam ClarksonWilliam PaulJoseph A. CalandrinoAriel J. FeldmanJacob AppelbaumEdward W. FeltenPublished in: USENIX Security Symposium (2008)
Keyphrases
- secret key
- stream cipher
- chosen plaintext attack
- image encryption
- ciphertext
- encryption scheme
- block cipher
- advanced encryption standard
- private key
- cryptographic protocols
- hash functions
- cryptographic algorithms
- authentication scheme
- smart card
- countermeasures
- security analysis
- pseudorandom
- secure communication
- encryption algorithms
- high security
- encryption algorithm
- encryption decryption
- public key
- elliptic curve cryptography
- malicious attacks
- key distribution
- security mechanisms
- watermarking scheme
- security properties
- diffie hellman
- denial of service attacks
- digital images
- watermarking algorithm
- similarity search