Login / Signup
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models.
Samuel Neves
Mehdi Tibouchi
Published in:
IET Inf. Secur. (2018)
Keyphrases
</>
endpoints
b spline
planar curves
digital curves
countermeasures
curve matching
closed curves
curve fitting
watermarking scheme
control points
traffic analysis
smooth curves
malicious attacks
curve segments
space curves
straight line segments
information security
probabilistic model
security threats