Login / Signup
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks.
Suvradip Chakraborty
C. Pandu Rangan
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
public key encryption
watermarking scheme
digital images
detecting malicious
information leakage
proxy re encryption
robust watermarking scheme
watermarking technique
security protocols
ciphertext
watermarking method