Login / Signup
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.
Donald Q. Adams
Hemanta K. Maji
Hai H. Nguyen
Minh L. Nguyen
Anat Paskin-Cherniavsky
Tom Suad
Mingyuan Wang
Published in:
ISIT (2021)
Keyphrases
</>
secret sharing scheme
lower bound
secret sharing
information leakage
key management
objective function
optimal solution
image processing
wireless sensor networks
watermarking algorithm
resource constrained
encryption scheme
black and white
query processing
watermarking scheme