Does Coupling Affect the Security of Masked Implementations?
Thomas De CnuddeBegül BilginBenedikt GierlichsVentzislav NikovSvetla NikovaVincent RijmenPublished in: COSADE (2017)
Keyphrases
- security issues
- information security
- security requirements
- access control
- statistical databases
- security systems
- security policies
- efficient implementation
- security measures
- security mechanisms
- security threats
- security problems
- information assurance
- high security
- security analysis
- key management
- risk analysis
- network security
- cyber security
- data security
- computer security
- security management
- risk assessment
- data encryption
- database