Login / Signup

On Avoiding ZVP-Attacks Using Isogeny Volcanoes.

Josep M. MiretDaniel SadornilJuan TenaRosana TomàsMagda Valls
Published in: WISA (2008)
Keyphrases
  • countermeasures
  • malicious attacks
  • watermarking scheme
  • neural network
  • digital watermarking
  • stream cipher
  • real time
  • security protocols
  • security threats
  • denial of service attacks
  • malicious users
  • chosen plaintext