Login / Signup

A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality.

Jean LiénardyFrédéric Lafitte
Published in: Inf. Process. Lett. (2024)
Keyphrases
  • digital images
  • multiscale
  • data sets
  • image processing
  • mobile devices
  • access control
  • third party