Login / Signup
Obfuscation for Cryptographic Purposes.
Dennis Hofheinz
John Malone-Lee
Martijn Stam
Published in:
IACR Cryptol. ePrint Arch. (2006)
Keyphrases
</>
smart card
reverse engineering
hash functions
neural network
security protocols
galois field
databases
data mining
information retrieval
information systems
object oriented
control flow
data transformation