On Renyi Entropies and Their Applications to Guessing Attacks in Cryptography.
Serdar BoztasPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2014)
Keyphrases
- cryptographic algorithms
- countermeasures
- information security
- cellular automata
- security protocols
- malicious attacks
- cryptographic protocols
- traffic analysis
- malicious users
- smart card
- security risks
- digital image watermarking
- watermarking scheme
- third party
- watermarking algorithm
- computer security
- image watermarking
- terrorist attacks
- web services