Hardware security without secure hardware: How to decrypt with a password and a server.
Olivier BlazyLaura BrouilhetCéline ChevalierPatrick TowaIda TuckerDamien VergnaudPublished in: Theor. Comput. Sci. (2021)
Keyphrases
- authentication mechanism
- low cost
- real time
- application level
- information security
- security issues
- security requirements
- data encryption
- user authentication
- authentication protocol
- session key
- trusted computing
- computer systems
- password authentication
- low latency
- encryption scheme
- secret key
- security model
- ibm zenterprise
- hardware implementation
- computer security
- key management
- access control
- security measures
- password based authenticated key exchange
- intrusion detection
- protection scheme
- operating system
- remote server
- diffie hellman
- security level
- key distribution
- security protocols
- security analysis