Login / Signup
Twisted Polynomials and Forgery Attacks on GCM.
Mohamed Ahmed Abdelraheem
Peter Beelen
Andrey Bogdanov
Elmar Tischhauser
Published in:
EUROCRYPT (1) (2015)
Keyphrases
</>
digital images
countermeasures
computer security
watermarking technique
hermite transform
window search
malicious users
malicious attacks
traffic analysis
attack detection
low order
data corruption
watermarking scheme
cryptographic protocols
security threats
image watermarking
power analysis
data mining