Login / Signup
On Avoiding ZVP-Attacks Using Isogeny Volcanoes.
Josep M. Miret
Daniel Sadornil
Juan Tena
Rosana Tomàs
Magda Valls
Published in:
WISA (2008)
Keyphrases
</>
countermeasures
malicious attacks
watermarking scheme
neural network
digital watermarking
stream cipher
real time
security protocols
security threats
denial of service attacks
malicious users
chosen plaintext