MILP-Aided Security Evaluation of Differential Attacks on KCipher-2.
Jin HokiKosei SakamotoFukang LiuKazuhiko MinematsuTakanori IsobePublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2021)
Keyphrases
- security threats
- security mechanisms
- security problems
- security measures
- computer security
- cyber attacks
- countermeasures
- information security
- security protocols
- security breaches
- network security
- security issues
- java card
- linear program
- security risks
- cryptographic protocols
- cyber security
- security vulnerabilities
- stream cipher
- access control
- chosen plaintext
- dos attacks
- resource constrained
- watermarking scheme
- malicious users
- cryptographic algorithms
- attack scenarios