Login / Signup
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
Akiko Inoue
Tetsu Iwata
Kazuhiko Minematsu
Bertram Poettering
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
malicious attacks
digital images
access control
hash functions
information leakage
scatter search
data sets
signal processing
information security
personal information
signature scheme
secret key
s box
block cipher
data confidentiality