Login / Signup
iPMAC及VPMAC的伪造攻击 (Forgery Attack on Authenticated Cipher Mode iPMAC and VPMAC).
Yudan Tian
Yongzhuang Wei
Published in:
计算机科学 (2017)
Keyphrases
</>
key exchange protocol
ciphertext
block cipher
encryption algorithm
digital images
secret key
countermeasures
encryption scheme
ddos attacks
diffie hellman
encryption algorithms
malicious users
attack graph
key exchange
key distribution
signature verification
standard model
public key