Login / Signup

Boomerang Attacks on BLAKE-32.

Alex BiryukovIvica NikolicArnab Roy
Published in: FSE (2011)
Keyphrases
  • countermeasures
  • malicious users
  • watermarking scheme
  • malicious attacks
  • real time
  • digital images
  • watermarking technique
  • attack detection
  • traffic analysis
  • security risks
  • denial of service attacks