Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners.
Saeed MahloujifarMohammad MahmoodyPublished in: TCC (2) (2017)
Keyphrases
- watermarking scheme
- security protocols
- differential power analysis
- robust watermarking scheme
- malicious attacks
- detecting malicious
- learning environment
- cryptographic protocols
- smart card
- digital images
- learning activities
- learning process
- cryptographic algorithms
- transform domain
- e learning
- learning systems
- stream cipher
- watermarking technique
- collaborative learning
- reverse engineering
- learning experience
- watermarking algorithm
- jpeg compression
- language learning
- learning materials
- learning outcomes
- learning resources
- power analysis
- digital signature
- watermark embedding
- authentication scheme
- security mechanisms
- watermark detection
- s box
- digital watermarking
- copyright protection
- countermeasures
- high level
- denial of service attacks
- digital watermark
- learning styles
- tamper detection
- hash functions