Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Marcel MedwedFrançois-Xavier StandaertJohann GroßschädlFrancesco RegazzoniPublished in: AFRICACRYPT (2010)
Keyphrases
- low cost
- countermeasures
- fault injection
- information security
- java card
- security measures
- rfid tags
- smart card
- security threats
- security mechanisms
- cyber attacks
- security problems
- computer security
- security protocols
- security issues
- embedded systems
- security breaches
- stream cipher
- security vulnerabilities
- power analysis
- secret key
- security risks
- denial of service attacks
- security flaws
- key management
- scanning devices
- security requirements
- network security
- malicious users
- mobile devices
- cryptographic protocols
- chosen plaintext
- insider attacks
- fault model
- fault detection
- fault diagnosis
- sql injection
- access control
- cryptographic algorithms
- biometric template
- intrusion detection
- malicious attacks
- secure routing
- real time
- security policies
- resource constrained
- security analysis
- security management
- identity theft
- watermarking algorithm
- cyber security
- anomaly detection
- defense mechanisms
- elliptic curve
- intrusion prevention
- authentication protocol