Second-Order SCA Security with almost no Fresh Randomness.
Aein Rezaei ShahmirzadiAmir MoradiPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- security issues
- intrusion detection
- information security
- network security
- higher order
- security policies
- security requirements
- statistical databases
- security mechanisms
- security analysis
- security threats
- security systems
- computer security
- encryption scheme
- key management
- security protocols
- cyber security
- cyber attacks
- information systems