New Boomerang Attacks on ARIA.
Ewan FleischmannChristian ForlerMichael GorskiStefan LucksPublished in: INDOCRYPT (2010)
Keyphrases
- countermeasures
- watermarking scheme
- malicious attacks
- malicious users
- modular design
- security mechanisms
- denial of service attacks
- real time
- traffic analysis
- image watermarking
- chosen plaintext
- security flaws
- terrorist attacks
- security risks
- security threats
- java card
- security protocols
- computer security
- watermarking technique
- information security
- social networks
- neural network
- data sets