Login / Signup
Boomerang Attacks on BLAKE-32.
Alex Biryukov
Ivica Nikolic
Arnab Roy
Published in:
FSE (2011)
Keyphrases
</>
countermeasures
malicious users
watermarking scheme
malicious attacks
real time
digital images
watermarking technique
attack detection
traffic analysis
security risks
denial of service attacks