Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
Akiko InoueTetsu IwataKazuhiko MinematsuBertram PoetteringPublished in: CRYPTO (1) (2019)
Keyphrases
- information leakage
- block cipher
- digital images
- countermeasures
- traffic analysis
- information security
- access control
- attack detection
- security mechanisms
- malicious attacks
- genetic algorithm
- scatter search
- image watermarking
- malicious users
- terrorist attacks
- neural network
- watermarking technique
- personal information
- security threats
- digital watermarking
- denial of service attacks
- security protocols
- security issues
- watermarking scheme
- data corruption
- fragile watermarking scheme