Abstract | ||
---|---|---|
Related-key attacks (RKAs) are a flavor of powerful physical attacks, which allow an adversary to modify the secret key stored in a cryptographic device and subsequently observe the effect of such modifications on the output of the device. Designing secure encryption schemes against such attacks is a challenging task, especially for a large class of such physical attacks which are usually captured... |
Year | DOI | Venue |
---|---|---|
2016 | 10.1093/comjnl/bxw025 | The Computer Journal |
Keywords | Field | DocType |
related-key attack,chosen-ciphertext security,public key encryption | Computer science,Theoretical computer science,Invertible matrix,Related-key attack,Public-key cryptography | Journal |
Volume | Issue | ISSN |
59 | 11 | 0010-4620 |
Citations | PageRank | References |
1 | 0.35 | 22 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shifeng Sun | 1 | 59 | 15.53 |
Joseph K. Liu | 2 | 1134 | 67.24 |
Yu Yu | 3 | 219 | 30.37 |
Baodong Qin | 4 | 190 | 19.40 |
Dawu Gu | 5 | 644 | 103.50 |