On Renyi Entropies and their Applications to Guessing Attacks in Cryptography.
Serdar BoztasPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- cryptographic algorithms
- cellular automata
- countermeasures
- information security
- cryptographic protocols
- malicious attacks
- chosen plaintext
- elliptic curve cryptography
- terrorist attacks
- computer security
- watermarking scheme
- cyber attacks
- traffic analysis
- image watermarking
- security protocols
- security threats
- public key cryptography
- attack detection
- malicious users
- watermarking algorithm