Login / Signup
Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation.
Yuval Ishai
Alexis Korb
Paul Lou
Amit Sahai
Published in:
CRYPTO (2) (2022)
Keyphrases
</>
coding scheme
lower bound
upper bound
worst case
coding method
static analysis
reverse engineering
database
case study
error bounds