Lest we remember: cold-boot attacks on encryption keys.
J. Alex HaldermanSeth D. SchoenNadia HeningerWilliam ClarksonWilliam PaulJoseph A. CalandrinoAriel J. FeldmanJacob AppelbaumEdward W. FeltenPublished in: Commun. ACM (2009)
Keyphrases
- secret key
- stream cipher
- chosen plaintext attack
- encryption scheme
- ciphertext
- image encryption
- block cipher
- advanced encryption standard
- cryptographic protocols
- hash functions
- private key
- cryptographic algorithms
- smart card
- countermeasures
- standard model
- encryption decryption
- public key
- security analysis
- security threats
- malicious attacks
- malicious users
- encryption algorithms
- key distribution
- authentication scheme
- signature scheme
- watermarking algorithm
- key management
- ddos attacks
- authentication protocol
- watermarking scheme