Login / Signup

Invalid Curve Attacks in a GLS Setting.

Taechan KimMehdi Tibouchi
Published in: IWSEC (2015)
Keyphrases
  • countermeasures
  • endpoints
  • cryptographic protocols
  • malicious attacks
  • database
  • image sequences
  • watermarking algorithm
  • computer security
  • planar curves
  • security threats
  • traffic analysis
  • data publishing