Login / Signup
Preimage Attacks against PKC98-Hash and HAS-V.
Yu Sasaki
Florian Mendel
Kazumaro Aoki
Published in:
ICISC (2010)
Keyphrases
</>
countermeasures
hash functions
malicious users
watermarking scheme
public key
traffic analysis
security risks
information security
security threats
attack detection
dual space
b tree
public key cryptography
chosen plaintext