Login / Signup
Leakage and Tamper Resilient Permutation-Based Cryptography.
Christoph Dobraunig
Bart Mennink
Robert Primas
Published in:
CCS (2022)
Keyphrases
</>
cellular automata
information security
security level
digital watermarking
image authentication
databases
artificial intelligence
case study
digital images
signal processing
formal model
security properties
information leakage
cryptographic algorithms
encryption algorithms
data leakage prevention