On Fingerprinting Attacks and Length-Hiding Encryption.
Kai GellertTibor JagerLin LyuTom NeuschultenPublished in: CT-RSA (2022)
Keyphrases
- stream cipher
- cryptographic algorithms
- countermeasures
- advanced encryption standard
- cryptographic protocols
- watermarking scheme
- security mechanisms
- security properties
- encryption algorithms
- copyright protection
- watermarking algorithm
- packet size
- information hiding
- digital signature
- block cipher
- elliptic curve cryptography
- secret key
- encryption algorithm
- security threats
- image authentication
- malicious attacks
- encryption scheme
- encryption decryption