Login / Signup
Breaking and Repairing an Approximate Message Authentication Scheme.
Dongvu Tonien
Reihaneh Safavi-Naini
Peter Nickolas
Published in:
Discret. Math. Algorithms Appl. (2011)
Keyphrases
</>
authentication scheme
smart card
user authentication
least significant bit
secret key
public key
image encryption
image authentication
security flaws
security analysis
authentication protocol
face recognition
real time
information systems