Login / Signup
Modifying YCN key assignment scheme to resist the attack from Hwang.
Jyh-haw Yeh
Marion Scheepers
Wen-Chen Hu
Published in:
Inf. Process. Lett. (2005)
Keyphrases
</>
case study
block cipher
secret key
authentication protocol
data sets
secure communication
provably secure
digital watermark