Protection of keys against modification attack | IEEE Conference Publication | IEEE Xplore