Login / Signup
Invisible Formula Attacks.
David Naccache
Ofer Yifrach-Stav
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
countermeasures
malicious attacks
attack detection
watermarking scheme
chosen plaintext
watermarking algorithm
security protocols
security threats
traffic analysis
terrorist attacks
database
neural network
cooperative
computer security
cryptographic protocols
stream cipher