Login / Signup
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More.
Sanketh Menda
Julia Len
Paul Grubbs
Thomas Ristenpart
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
context aware
contextual information
context sensitive
database
data sets
information retrieval
social networks
image retrieval
digital images
pattern discovery
discovery process
malicious attacks