Twisted Polynomials and Forgery Attacks on GCM.
Mohamed Ahmed AbdelraheemPeter BeelenAndrey BogdanovElmar TischhauserPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- digital images
- countermeasures
- watermarking scheme
- computer security
- window search
- chosen plaintext
- traffic analysis
- jpeg images
- signature verification
- security threats
- hermite transform
- efficient computation
- watermarking algorithm
- security protocols
- java card
- intrusion detection
- malicious attacks
- attack detection
- malicious users
- anomaly detection
- lagrange interpolation
- information systems