Login / Signup

A MAC Forgery Attack on SOBER-128.

Dai WatanabeSoichi Furuya
Published in: FSE (2004)
Keyphrases
  • digital images
  • countermeasures
  • malicious attacks
  • power analysis
  • attack detection
  • data structure
  • secret key
  • ddos attacks
  • fully updated