Login / Signup
Invalid Curve Attacks in a GLS Setting.
Taechan Kim
Mehdi Tibouchi
Published in:
IWSEC (2015)
Keyphrases
</>
countermeasures
endpoints
cryptographic protocols
malicious attacks
database
image sequences
watermarking algorithm
computer security
planar curves
security threats
traffic analysis
data publishing