Login / Signup
Cold Boot Attacks in the Discrete Logarithm Setting.
Bertram Poettering
Dale L. Sibborn
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
countermeasures
finite number
image processing
malicious attacks
digital image watermarking
discrete geometry
security threats
attack detection
malicious users
case study
email
security protocols
translation invariant
traffic analysis
denial of service attacks
discrete version