Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server.
Olivier BlazyLaura BrouilhetCéline ChevalierPatrick TowaIda TuckerDamien VergnaudPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- authentication mechanism
- information security
- low cost
- session key
- secret key
- trusted computing
- real time
- security issues
- application level
- authentication protocol
- user authentication
- security requirements
- encryption scheme
- security level
- protection scheme
- password authentication
- low latency
- data encryption
- hardware implementation
- protection schemes
- intrusion detection
- public key
- password based authenticated key exchange
- ibm zenterprise
- key exchange protocol
- client server
- security model
- security protocols
- security analysis
- computer security
- diffie hellman
- security measures
- network access
- identity management
- computer systems
- key management
- security mechanisms
- sensitive data