Login / Signup
Forgery Attacks on FlexAE and FlexAEAD.
Maria Eichlseder
Daniel Kales
Markus Schofnegger
Published in:
IMACC (2019)
Keyphrases
</>
digital images
countermeasures
terrorist attacks
traffic analysis
malicious attacks
attack detection
data sets
computer security
signature verification
cyber attacks
cryptographic protocols
java card
power analysis
malicious users
digital image watermarking