Threshold-based Obfuscated Keys with Quantifiable Security against Invasive Readout.
Shahrzad KeshavarzDaniel E. HolcombPublished in: CoRR (2017)
Keyphrases
- private key
- information security
- reverse engineering
- intrusion detection
- public key
- security level
- network security
- security policies
- security issues
- secret key
- statistical databases
- security mechanisms
- computer security
- security threats
- public key cryptosystem
- key agreement protocol
- key agreement
- information systems
- authentication scheme
- user authentication
- sensitive data
- access control