Login / Signup
Algebraic Attacks Over GF(q).
Lynn Margaret Batten
Published in:
INDOCRYPT (2004)
Keyphrases
</>
countermeasures
security threats
malicious attacks
watermarking scheme
security protocols
image watermarking
digital image watermarking
algebraic structure
algebraic expressions
detect malicious
real time
data sets
bayesian networks
email
higher order
traffic analysis