Login / Signup
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.
Gordon Procter
Carlos Cid
Published in:
J. Cryptol. (2015)
Keyphrases
</>
digital images
countermeasures
watermarking scheme
cryptographic protocols
hash functions
signature verification
security threats
key agreement