On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Guangjun FanYongbin ZhouFrançois-Xavier StandaertDengguo FengPublished in: ISPEC (2015)
Keyphrases
- security properties
- key management
- security protocols
- cryptographic algorithms
- protection schemes
- key management scheme
- cryptographic protocols
- public key encryption
- smart card
- access control
- key agreement
- encryption scheme
- encryption decryption
- information security
- real world
- security issues
- provably secure
- high assurance
- encryption key
- data security
- security level
- security requirements
- random number generator
- network security
- elliptic curve cryptography
- fuzzy vault
- security mechanisms
- hash functions
- authentication protocol
- intrusion detection
- security analysis