Threshold-based obfuscated keys with quantifiable security against invasive readout.
Shahrzad KeshavarzDaniel E. HolcombPublished in: ICCAD (2017)
Keyphrases
- network security
- information security
- key agreement
- intrusion detection
- security policies
- statistical databases
- security issues
- access control
- private key
- security requirements
- computer security
- security systems
- security management
- information assurance
- secret key
- encryption scheme
- key management
- data security
- elliptic curve
- security level
- cloud computing
- security threats
- database systems