Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries.
Jenny BlessingMichael A. SpecterDaniel J. WeitznerPublished in: AsiaCCS (2024)
Keyphrases
- information security
- smart card
- cryptographic algorithms
- public key cryptography
- security mechanisms
- countermeasures
- security issues
- security protocols
- digital libraries
- elliptic curve cryptography
- cellular automata
- network security
- cryptographic protocols
- security requirements
- hash functions
- multimedia
- sensitive data
- secure communication
- encryption key
- encryption scheme
- security risks
- galois field
- elliptic curve
- database
- intrusion detection
- access control
- e government
- authentication protocol
- security properties
- authentication scheme
- security analysis
- attack graph
- data mining
- attack graphs
- data sets