Mathematische Grundlagen von Tampering-Attacken

Further information can be found in the project profile.

To the project profile