Trick or Tweak: On the (In)security of OTR's Tweaks.
Raphael BostOlivier SandersPublished in: ASIACRYPT (1) (2016)
Keyphrases
- information security
- intrusion detection
- access control
- computer security
- network security
- security requirements
- security vulnerabilities
- security policies
- statistical databases
- security issues
- data sets
- security measures
- malware detection
- security level
- security systems
- security mechanisms
- functional requirements
- real time
- key management
- smart card
- high security
- card games