Login / Signup
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
Elena Andreeva
Charles Bouillaguet
Orr Dunkelman
John Kelsey
Published in:
Selected Areas in Cryptography (2009)
Keyphrases
</>
countermeasures
email
watermarking scheme
communication channels
attack detection
malicious attacks
malicious code
digital plane
security threats
data corruption
program chairs
denial of service attacks
traffic analysis
data mining
static analysis
watermarking algorithm
social networks