Security margin evaluation of SHA-3 contest finalists through SAT-based attacks.
Ekawat HomsirikamolPawel MorawieckiMarcin RogawskiMarian SrebrnyPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security threats
- security mechanisms
- computer security
- security problems
- security protocols
- security vulnerabilities
- information security
- security measures
- countermeasures
- security issues
- java card
- answer set programming
- network security
- fault injection
- access control
- security flaws
- stream cipher
- security requirements
- cyber attacks
- malicious attacks
- identity theft
- sat solvers
- security breaches
- intrusion detection
- block cipher
- denial of service attacks
- malicious users
- bounded model checking
- heuristic search