On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks.
Christoph DobraunigMaria EichlsederStefan MangardFlorian MendelPublished in: CARDIS (2014)
Keyphrases
- countermeasures
- fault injection
- java card
- information security
- security measures
- security threats
- smart card
- cyber attacks
- security mechanisms
- security problems
- security protocols
- security breaches
- computer security
- security vulnerabilities
- security risks
- stream cipher
- security flaws
- chosen plaintext
- security issues
- fault diagnosis
- security requirements
- fault model
- intrusion detection
- cryptographic algorithms
- power analysis
- network security
- denial of service attacks
- access control
- cryptographic protocols
- malicious users
- identity theft
- malicious attacks
- intrusion prevention
- security analysis
- sql injection
- fault detection
- secret key
- cyber security
- wireless sensor networks
- security policies
- authentication scheme
- key management
- unauthorized access
- resource constrained
- encryption algorithms
- insider attacks
- malicious nodes
- user authentication