Security on SM2 and GOST Signatures against Related Key Attacks.
Handong CuiXianrui QinCailing CaiTsz Hon YuenPublished in: TrustCom (2021)
Keyphrases
- security mechanisms
- security threats
- security protocols
- security problems
- security measures
- computer security
- high security
- block cipher
- security issues
- information security
- java card
- countermeasures
- denial of service attacks
- security requirements
- intrusion detection
- security vulnerabilities
- malicious users
- fault injection
- identity theft
- security flaws
- key management
- security risks
- security policies
- stream cipher
- biometric template
- security breaches