Login / Signup
Generic Attacks Against Beyond-Birthday-Bound MACs.
Gaëtan Leurent
Mridul Nandi
Ferdinand Sibleyras
Published in:
CRYPTO (1) (2018)
Keyphrases
</>
lower bound
countermeasures
domain specific
upper bound
worst case
watermarking scheme
database systems
error bounds
security mechanisms
traffic analysis
digital image watermarking
data mining
security risks
security threats
java card
generic model
high level
case study