Login / Signup
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.
Martin R. Albrecht
Amit Deo
Kenneth G. Paterson
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
countermeasures
watermarking scheme
malicious attacks
watermarking algorithm
security protocols
integrity constraints
attack detection
malicious users
data mining
digital images
computer security
security threats