Login / Signup
Preventing CLT Attacks on Obfuscation with Linear Overhead.
Rex Fernando
Peter M. R. Rasmussen
Amit Sahai
Published in:
ASIACRYPT (3) (2017)
Keyphrases
</>
linear systems
data corruption
neural network
closed form
data mining
cooperative
privacy preserving
countermeasures
static analysis
security mechanisms
computer security
security protocols
malicious attacks