Login / Signup

Preventing CLT Attacks on Obfuscation with Linear Overhead.

Rex FernandoPeter M. R. RasmussenAmit Sahai
Published in: ASIACRYPT (3) (2017)
Keyphrases
  • linear systems
  • data corruption
  • neural network
  • closed form
  • data mining
  • cooperative
  • privacy preserving
  • countermeasures
  • static analysis
  • security mechanisms
  • computer security
  • security protocols
  • malicious attacks