Return of GGH15: Provable Security Against Zeroizing Attacks.
James BartusekJiaxin GuanFermi MaMark ZhandryPublished in: TCC (2) (2018)
Keyphrases
- security threats
- security mechanisms
- security problems
- security protocols
- security vulnerabilities
- java card
- stream cipher
- computer security
- security measures
- security issues
- security breaches
- security risks
- cyber attacks
- security flaws
- chosen plaintext
- countermeasures
- denial of service attacks
- fault injection
- malicious attacks
- identity theft
- malicious users
- cryptographic protocols
- cryptographic algorithms
- access control
- intrusion detection
- information security
- attack scenarios
- key management
- network security
- insider attacks
- dos attacks
- security policies
- denial of service
- resource constrained
- security requirements
- secure routing
- information leakage
- buffer overflow
- intrusion prevention
- smart card
- security management
- security properties
- intrusion detection and prevention
- biometric template
- attack detection
- malicious activities
- statistical databases
- security analysis
- cyber security
- security level