Login / Signup
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed.
Mustafa Khairallah
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
countermeasures
attack detection
neural network
security threats
database
database systems
hash functions
secret key
security mechanisms
security protocols
ddos attacks