Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
Akiko InoueTetsu IwataKazuhiko MinematsuBertram PoetteringPublished in: J. Cryptol. (2020)
Keyphrases
- information leakage
- block cipher
- digital images
- countermeasures
- security mechanisms
- access control
- malicious attacks
- watermarking algorithm
- personal information
- information security
- watermarking scheme
- security protocols
- attack detection
- signature scheme
- secret key
- web services
- key management
- computer security
- secret information
- image watermarking
- scatter search
- traffic analysis
- malicious users
- data sets
- security threats
- java card
- security properties
- digital watermarking
- hash functions
- database systems
- information systems
- neural network