Misuse Attacks on Post-Quantum Cryptosystems.
Ciprian BaetuF. Betül DurakLoïs Huguenin-DumittanAbdullah TalayhanSerge VaudenayPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- countermeasures
- cryptographic protocols
- information security
- quantum computing
- fuzzy vault
- biometric template
- logic circuits
- watermarking scheme
- secret key
- digital images
- traffic analysis
- malicious attacks
- security threats
- quantum computation
- misuse detection
- denial of service attacks
- elliptic curve
- quantum mechanics
- ddos attacks
- signature scheme
- intrusion detection system