Keyphrases
- secret key
- block cipher
- encryption algorithm
- fault model
- smart card
- model checking
- countermeasures
- authentication scheme
- authentication protocol
- encryption decryption
- ddos attacks
- databases
- public key
- hash functions
- information systems
- information retrieval
- ciphertext
- dos attacks
- key distribution
- case study
- power analysis
- artificial intelligence
- attack graph