Login / Signup
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff.
Haibo Zhou
Rui Zong
Xiaoyang Dong
Keting Jia
Willi Meier
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
block cipher
database
terrorist attacks
database systems
watermarking scheme
countermeasures
malicious attacks
real time
data mining
image quality
intrusion detection system
image watermarking
malicious users
chosen plaintext