Attacks on Lightweight Hardware-Based Security Primitives.
Jack EdmondsFatemeh TehranipoorPublished in: CoRR (2020)
Keyphrases
- lightweight
- dos attacks
- denial of service attacks
- security vulnerabilities
- security mechanisms
- security threats
- cyber attacks
- security breaches
- block cipher
- computer security
- security problems
- java card
- security protocols
- rfid tags
- security measures
- information security
- countermeasures
- security issues
- fault injection
- protection schemes
- security flaws
- authentication protocol
- computer systems
- network security
- security risks
- cryptographic protocols
- low cost
- chosen plaintext
- stream cipher
- advanced encryption standard
- access control
- security requirements
- buffer overflow
- secure routing
- intrusion detection
- malicious users
- cryptographic algorithms
- security policies
- wireless sensor networks
- information leakage
- communication infrastructure
- computer networks
- development environments
- resource constrained
- cyber security
- web services
- embedded systems
- key management