Sciweavers

PKC
1999
Springer
96views Cryptology» more  PKC 1999»
13 years 9 months ago
How to Copyright a Function?
This paper introduces a method for tracking different copies of functionally equivalent algorithms containing identification marks known to the attacker. Unlike all previous solu...
David Naccache, Adi Shamir, Julien P. Stern