Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm.
Ashwin JhaMustafa KhairallahMridul NandiAbishanka SahaPublished in: EUROCRYPT (1) (2024)
Keyphrases
- security threats
- security mechanisms
- security problems
- computer security
- security protocols
- security vulnerabilities
- security measures
- java card
- cyber attacks
- denial of service attacks
- security flaws
- chosen plaintext
- stream cipher
- security issues
- security requirements
- countermeasures
- security risks
- information security
- security breaches
- fault injection
- malicious users
- malicious attacks
- access control
- smart card
- intrusion prevention
- secure routing
- cryptographic protocols
- insider attacks
- face detection
- information leakage
- intrusion detection and prevention
- biometric template
- network security
- resource constrained
- protection mechanisms
- buffer overflow
- lower bound
- authentication protocol
- key management
- upper bound
- dos attacks
- cyber security
- intrusion detection system
- anomaly detection
- worst case
- attack scenarios
- security properties
- cryptographic algorithms
- attack detection
- security management
- malware detection
- security analysis
- security policies
- computer networks
- wireless sensor networks