Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
Luka MusicCéline ChevalierElham KashefiPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- security model
- countermeasures
- attack detection
- malicious users
- public key
- security requirements
- denial of service attacks
- access control
- security analysis
- cyber attacks
- information security
- ddos attacks
- attack scenarios
- block cipher
- security architecture
- data corruption
- dos attacks
- secret key
- security mechanisms
- detecting malicious
- designated verifier
- provably secure
- security problems
- smart card
- authentication protocol
- security protocols
- security policies
- sql injection
- distributed denial of service attacks
- authentication and key agreement
- cryptographic protocols
- ciphertext
- malicious nodes
- digital watermarking
- watermarking scheme
- hash functions