Login / Signup
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
Marc Fischlin
Sogol Mazaheri
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
learning algorithm
database
image compression
cryptographic protocols
insider attacks