Login / Signup
Generic Attacks against Beyond-Birthday-Bound MACs.
Gaëtan Leurent
Mridul Nandi
Ferdinand Sibleyras
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
web applications
countermeasures
upper bound
worst case
lower bound
traffic analysis
digital image watermarking
domain specific
malicious attacks
watermarking scheme
computer security
privacy preserving
malicious users
denial of service attacks
security threats
database
anomaly detection
data mining
data sets