Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
Thomas UnterluggauerMario WernerStefan MangardPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- encryption decryption
- data encryption
- identity authentication
- identity management
- smart card
- public key cryptography
- image authentication
- secret key
- security analysis
- integrity verification
- virtual private network
- authentication scheme
- low level
- elliptic curve cryptography
- image encryption
- security requirements
- security properties
- data security
- secure communication
- high level
- memory requirements
- public key
- memory usage
- user authentication
- information security
- authentication mechanism
- digital signature
- high security
- private key
- encryption algorithm
- encryption algorithms
- building blocks
- elliptic curve
- authentication protocol
- security mechanisms
- key distribution
- information hiding