Login / Signup
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation.
Yilei Chen
Minki Hhan
Vinod Vaikuntanathan
Hoeteck Wee
Published in:
TCC (1) (2019)
Keyphrases
</>
reverse engineering
countermeasures
traffic analysis
malicious attacks
singular value decomposition
security threats
watermarking scheme
watermarking algorithm
computer security
singular values
malicious users
data sets
security mechanisms
linear algebra
security protocols
unauthorized access