Login / Signup
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems.
J. Hughes
Allen R. Tannenbaum
Published in:
IACR Cryptol. ePrint Arch. (2003)
Keyphrases
</>
rewriting systems
rewriting rules
watermarking scheme
stream cipher
cryptographic algorithms
advanced encryption standard
databases
database systems
complex objects
security protocols
image encryption
packet size