Login / Signup
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.
Gordon Procter
Carlos Cid
Published in:
FSE (2013)
Keyphrases
</>
digital images
watermarking scheme
security threats
denial of service attacks
malicious attacks
cryptographic algorithms
hash functions
countermeasures
watermarking algorithm
secret key
key agreement
chosen plaintext