Dispelling myths on superposition attacks: formal security model and attack analyses.
Luka MusicCéline ChevalierElham KashefiPublished in: Des. Codes Cryptogr. (2022)
Keyphrases
- security model
- countermeasures
- attack detection
- malicious users
- security requirements
- denial of service attacks
- access control
- public key
- attack scenarios
- security analysis
- ddos attacks
- security mechanisms
- data corruption
- information security
- cyber attacks
- security architecture
- dos attacks
- block cipher
- provably secure
- security problems
- secret key
- intrusion detection system
- malicious nodes
- designated verifier
- detecting malicious
- security properties
- authentication protocol
- security protocols
- security policies
- ciphertext
- public key cryptography
- security issues
- sensitive information
- smart card
- cost effective
- anomaly detection