Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.
Yaobin ShenFrançois-Xavier StandaertLei WangPublished in: ASIACRYPT (3) (2023)
Keyphrases
- secure routing
- cryptographic protocols
- security mechanisms
- chosen plaintext
- chosen message
- security protocols
- stream cipher
- authentication scheme
- remote user authentication scheme
- security measures
- signature scheme
- security threats
- cryptographic algorithms
- digital images
- upper bound
- block cipher
- security issues
- lower bound
- security flaws
- bilinear pairings
- key management
- information leakage
- advanced encryption standard
- smart card
- access control
- countermeasures
- insider attacks
- error bounds
- user authentication
- watermarking scheme
- ad hoc networks
- lightweight
- security requirements
- authentication protocol
- unauthorized access
- security analysis
- standard model
- routing protocol
- worst case
- operating system
- protection mechanisms
- information security
- diffie hellman
- security management
- s box
- signature verification
- digital watermarking
- secret key
- sensitive data