Login / Signup
Quantum Boomerang Attacks and Some Applications.
Paul Frixons
María Naya-Plasencia
André Schrottenloher
Published in:
SAC (2021)
Keyphrases
</>
countermeasures
watermarking scheme
quantum computation
malicious attacks
security mechanisms
security threats
attack detection
channel capacity
quantum computing
data sets
information retrieval
case study
image watermarking
traffic analysis
malicious users