Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.
Yaobin ShenFrançois-Xavier StandaertLei WangPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- authentication scheme
- chosen message
- secure routing
- security mechanisms
- security protocols
- stream cipher
- chosen plaintext
- cryptographic protocols
- security flaws
- security measures
- upper bound
- cryptographic algorithms
- security issues
- remote user authentication scheme
- digital images
- smart card
- lower bound
- worst case
- key management
- advanced encryption standard
- security threats
- information leakage
- routing protocol
- block cipher
- resource constrained
- unauthorized access
- ad hoc networks
- countermeasures
- computer security
- watermarking scheme
- insider attacks
- error bounds
- user authentication
- security management
- digital signature
- standard model
- secret key
- watermarking algorithm
- intrusion detection
- access control