Login / Signup
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation.
Yuval Ishai
Alexis Korb
Paul Lou
Amit Sahai
Published in:
J. Cryptol. (2024)
Keyphrases
</>
coding scheme
upper bound
lower bound
worst case
reverse engineering
error control
data sets
coding method
static analysis
genetic algorithm
computer vision
image processing
inter frame