Login / Signup
Indistinguishability Obfuscation from Well-Founded Assumptions.
Aayush Jain
Huijia Lin
Amit Sahai
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
reverse engineering
data sets
data mining
control flow
restrictive assumptions
real time
artificial intelligence
privacy preserving
static analysis
data transformation
simplifying assumptions