Login / Signup
Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions.
Francesca Falzon
Evangelia Anna Markatou
William Schor
Roberto Tamassia
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
information leakage
countermeasures
information systems
multiple dimensions
malicious attacks
malicious users
data sets
case study
watermarking scheme
watermarking algorithm
java card
chosen plaintext