Cryptography Secure against Related-Key Attacks and Tampering.
Mihir BellareDavid CashRachel MillerPublished in: ASIACRYPT (2011)
Keyphrases
- cryptographic protocols
- block cipher
- cryptographic algorithms
- security mechanisms
- authentication scheme
- cellular automata
- watermarking scheme
- digital images
- stream cipher
- secure routing
- security flaws
- security protocols
- reverse engineering
- secure communication
- high security
- malicious attacks
- chosen plaintext
- image watermarking