Login / Signup

Extending Bleichenbacher's Forgery Attack.

Tetsuya IzuTakeshi ShimoyamaMasahiko Takenaka
Published in: Inf. Media Technol. (2008)
Keyphrases
  • digital images
  • real time
  • secret key
  • detection mechanism
  • attack detection
  • databases
  • real world
  • information retrieval
  • decision trees
  • signature verification
  • data corruption