Login / Signup
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates.
Yilei Chen
Vinod Vaikuntanathan
Hoeteck Wee
Published in:
CRYPTO (2) (2018)
Keyphrases
</>
theorem proving
countermeasures
watermarking scheme
attack detection
theorem prover
computer security
formal proof
mathematical proofs
security risks
security protocols
image watermarking
traffic analysis
chosen plaintext