The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults?
Jean-Jacques QuisquaterPublished in: SSS (2007)
Keyphrases
- security protocols
- cryptographic protocols
- security threats
- traffic analysis
- stream cipher
- insider attacks
- malicious attacks
- insider threat
- cryptographic algorithms
- security measures
- security mechanisms
- malicious users
- key management
- countermeasures
- malicious nodes
- detect malicious
- differential power analysis
- malicious traffic
- secure routing
- security issues
- smart card
- network traffic
- denial of service attacks
- normal traffic
- network attacks
- wireless sensor networks
- buffer overflow
- chosen plaintext
- advanced encryption standard
- security architecture
- block cipher
- ddos attacks
- security properties
- malicious code
- peer to peer
- network security
- watermarking scheme
- sensitive data
- malicious activities
- computer security
- security analysis
- resource constrained
- hash functions
- power consumption
- privacy preserving
- malicious behavior