Login / Signup
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality.
Jean Liénardy
Frédéric Lafitte
Published in:
Inf. Process. Lett. (2024)
Keyphrases
</>
digital images
multiscale
data sets
image processing
mobile devices
access control
third party