Attacks on the Firekite cipher.
Thomas JohanssonWilli MeierVu NguyenPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- stream cipher
- block cipher
- advanced encryption standard
- countermeasures
- malicious attacks
- watermarking algorithm
- secret key
- security threats
- stepping stones
- security protocols
- pseudorandom
- encryption algorithms
- traffic analysis
- detecting malicious
- digital image watermarking
- malicious users
- attack detection
- terrorist attacks
- denial of service attacks
- data mining
- security analysis
- watermarking scheme
- smart card