Login / Signup

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.

Gordon ProcterCarlos Cid
Published in: J. Cryptol. (2015)
Keyphrases
  • digital images
  • countermeasures
  • watermarking scheme
  • cryptographic protocols
  • hash functions
  • signature verification
  • security threats
  • key agreement