Attacks and Defenses in Cryptography
Authors
Xiaoling Zhu, Zhengfeng Hou
Corresponding Author
Xiaoling Zhu
Available Online March 2017.
- DOI
- 10.2991/isaeece-17.2017.68How to use a DOI?
- Keywords
- Cryptography; Attack and defense framework; Implementation cases
- Abstract
Attacks and defenses have always been the focus of information security. If some new attacks appear, the corresponding defense methods will be proposed. In particular, cryptography, as a key security technology, has developed in such an offensive and defensive confrontation environment. For classical cryptography and modern cryptography, attack models, attack means, security models, and security properties are given. Furthermore, attack and defense cases are demonstrated to provide a reference for enhancing the security of cryptography algorithms.
- Copyright
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xiaoling Zhu AU - Zhengfeng Hou PY - 2017/03 DA - 2017/03 TI - Attacks and Defenses in Cryptography BT - Proceedings of the 2017 2nd International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE 2017) PB - Atlantis Press SP - 356 EP - 359 SN - 2352-5401 UR - https://doi.org/10.2991/isaeece-17.2017.68 DO - 10.2991/isaeece-17.2017.68 ID - Zhu2017/03 ER -