Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners.
Saeed MahloujifarMohammad MahmoodyPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- watermarking scheme
- security protocols
- differential power analysis
- malicious attacks
- cryptographic algorithms
- cryptographic protocols
- digital images
- robust watermarking scheme
- learning experience
- forensic analysis
- detecting malicious
- smart card
- learning process
- language learning
- learning environment
- learning systems
- digital watermarking
- e learning
- jpeg compression
- authentication scheme
- stream cipher
- copyright protection
- watermarking algorithm
- collaborative learning
- countermeasures
- learning activities
- learning outcomes
- block cipher
- advanced encryption standard
- learning styles
- watermark embedding
- reverse engineering
- hash functions
- high level
- watermarking technique
- learning materials
- digital signature
- transform domain
- watermark detection
- learning resources
- digital watermark
- image watermarking
- ddos attacks