Login / Signup
Reflection Attacks on Product Ciphers.
Orhun Kara
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
chosen plaintext
stream cipher
block cipher
life cycle
security protocols
countermeasures
watermarking scheme
product information
malicious attacks
malicious users
search engine
information systems
data hiding
security threats
attack detection