One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Tibor JagerKenneth G. PatersonJuraj SomorovskyPublished in: NDSS (2013)
Keyphrases
- cryptographic algorithms
- countermeasures
- cellular automata
- information security
- cryptographic protocols
- watermarking scheme
- attack detection
- security protocols
- security threats
- traffic analysis
- java card
- malicious users
- terrorist attacks
- denial of service attacks
- security risks
- cooperative
- malicious attacks
- data mining
- watermarking technique
- digital images