Provable security against decryption failure attacks from LWE.
Christian MajenzFabrizio SisinniPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- unauthorized access
- security threats
- security problems
- security mechanisms
- java card
- cyber attacks
- computer security
- security vulnerabilities
- security measures
- encryption scheme
- security protocols
- security issues
- stream cipher
- fault injection
- security breaches
- denial of service attacks
- security policies
- access control
- information security
- countermeasures
- secure communication
- secret key
- encryption decryption
- security risks
- malicious users
- malicious attacks
- intrusion detection
- encryption algorithm
- smart card
- cryptographic protocols
- network security
- biometric template
- sensitive data
- insider attacks
- identity theft
- information leakage
- chosen plaintext
- intrusion prevention
- intrusion detection system
- security requirements
- cryptographic algorithms
- resource constrained
- data security
- ciphertext
- secure routing
- sql injection
- security flaws
- dos attacks
- security management
- attack detection
- watermarking algorithm
- computer networks
- standard model
- intrusion detection and prevention