Login / Signup

Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation.

Yuval IshaiAlexis KorbPaul LouAmit Sahai
Published in: J. Cryptol. (2024)
Keyphrases
  • coding scheme
  • upper bound
  • lower bound
  • worst case
  • reverse engineering
  • error control
  • data sets
  • coding method
  • static analysis
  • genetic algorithm
  • computer vision
  • image processing
  • inter frame