Login / Signup

Functional Encryption Without Obfuscation.

Sanjam GargCraig GentryShai HaleviMark Zhandry
Published in: TCC (A2) (2016)
Keyphrases
  • reverse engineering
  • data sets
  • information systems
  • encryption algorithms
  • real time
  • databases
  • key management
  • malware detection
  • functional analysis
  • static analysis
  • control flow
  • image encryption