First Page | Document Content | |
---|---|---|
![]() Date: 2015-05-30 14:43:40Tesa Computer security Crime Public safety Security Counterfeit Forgery | Source URL: www.tesa-scribos.comDownload Document from Source WebsiteFile Size: 2,81 MBShare Document on Facebook |
![]() | Introduction Forgery attack against CBC-MAC Modes of operationsDocID: 1xViB - View Document |
![]() | Differential Forgery Attack against LAC Ga¨etan Leurent Inria, France Abstract. LAC is one of the candidates to the CAESAR competition.DocID: 1xUYK - View Document |
![]() | Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, FranceDocID: 1xTVn - View Document |
![]() | Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford UniversityDocID: 1xTKA - View Document |
![]() | Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,DocID: 1vmu2 - View Document |