Login / Signup
Indistinguishability Obfuscation from Well-Founded Assumptions.
Aayush Jain
Huijia Lin
Amit Sahai
Published in:
CoRR (2020)
Keyphrases
</>
reverse engineering
control flow
simplifying assumptions
underlying assumptions
neural network
case study
encryption scheme
malware detection
database views