Characterizing overstretched NTRU attacks.
Gabrielle De MicheliNadia HeningerBarak ShaniPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- group signature scheme
- countermeasures
- security mechanisms
- watermarking scheme
- java card
- security threats
- chosen plaintext
- cooperative
- watermarking algorithm
- denial of service attacks
- security protocols
- computer security
- malicious users
- traffic analysis
- digital watermarking
- neural network
- information security
- operating system
- social networks