Login / Signup
On Fingerprinting Attacks and Length-Hiding Encryption.
Kai Gellert
Tibor Jager
Lin Lyu
Tom Neuschulten
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
cryptographic algorithms
stream cipher
cryptographic protocols
advanced encryption standard
packet size
countermeasures
watermarking scheme
encryption algorithms
digital content
security protocols
copyright protection
denial of service attacks
secret key
block cipher