Cryptography Secure Against Related-Key Attacks and Tampering.
Mihir BellareDavid CashRachel MillerPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- cryptographic protocols
- cryptographic algorithms
- block cipher
- watermarking scheme
- authentication scheme
- security mechanisms
- chosen plaintext
- cellular automata
- security protocols
- secure communication
- malicious attacks
- secure routing
- elliptic curve cryptography
- reverse engineering
- security requirements
- countermeasures
- security flaws