Cryptographic Password Obfuscation.
Giovanni Di CrescenzoLisa BahlerBrian A. CoanPublished in: ICICS (2018)
Keyphrases
- smart card
- information security
- reverse engineering
- static analysis
- hash functions
- control flow
- encryption key
- user authentication
- key management
- malware detection
- data transformation
- digital signature
- s box
- security protocols
- packet filtering
- data mining
- password authentication
- graphical password
- security properties
- cryptographic protocols
- information systems