Login / Signup

Modifying YCN key assignment scheme to resist the attack from Hwang.

Jyh-haw YehMarion ScheepersWen-Chen Hu
Published in: Inf. Process. Lett. (2005)
Keyphrases
  • case study
  • block cipher
  • secret key
  • authentication protocol
  • data sets
  • secure communication
  • provably secure
  • digital watermark