Login / Signup
Functional Encryption Without Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mark Zhandry
Published in:
TCC (A2) (2016)
Keyphrases
</>
reverse engineering
data sets
information systems
encryption algorithms
real time
databases
key management
malware detection
functional analysis
static analysis
control flow
image encryption