GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates.
Yilei ChenVinod VaikuntanathanHoeteck WeePublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- countermeasures
- watermarking scheme
- malicious users
- theorem proving
- malicious attacks
- denial of service attacks
- security threats
- equational theories
- attack detection
- terrorist attacks
- watermarking algorithm
- theorem prover
- traffic analysis
- watermarking method
- digital images
- security protocols
- computer security
- final answer
- signal processing