Login / Signup

Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation.

Yuval IshaiAlexis KorbPaul LouAmit Sahai
Published in: CRYPTO (2) (2022)
Keyphrases
  • coding scheme
  • lower bound
  • upper bound
  • worst case
  • coding method
  • static analysis
  • reverse engineering
  • database
  • case study
  • error bounds