The sender’s unique information should be used in a signature; It should be easy to create a signature; It should be impossible to falsify a signature computationally; A signature should be small.
In this paper, the authors examine the problems and their possible solutions on the specifics of using equivalent instructions for the hidden embedding of information into the executable and library ...