Login / Signup

Equivalent public keys and a key substitution attack on the schemes from vector decomposition.

Seongan LimEunjeong LeeCheol-Min Park
Published in: Secur. Commun. Networks (2014)
Keyphrases
  • key agreement
  • secret key
  • block cipher
  • countermeasures
  • decomposition method
  • database
  • data mining
  • feature vectors
  • decomposition algorithm
  • security properties