Defeating Any Secret Cryptography with SCARE Attacks.
Sylvain GuilleyLaurent SauvageJulien MicolodDenis RéalFrédéric ValettePublished in: LATINCRYPT (2010)
Keyphrases
- cryptographic algorithms
- cellular automata
- countermeasures
- watermarking scheme
- cryptographic protocols
- malicious attacks
- information security
- traffic analysis
- security protocols
- chosen plaintext
- security threats
- denial of service attacks
- attack detection
- ddos attacks
- computer security
- malicious users
- secret key
- terrorist attacks
- elliptic curve cryptography
- secret sharing scheme
- image watermarking
- dos attacks
- information systems
- watermarking technique
- security mechanisms
- privacy preserving
- web services