Login / Signup

On Statistically Secure Obfuscation with Approximate Correctness.

Zvika BrakerskiChristina BrzuskaNils Fleischhacker
Published in: CRYPTO (2) (2016)
Keyphrases
  • reverse engineering
  • security requirements
  • static analysis
  • cryptographic protocols
  • databases
  • case study
  • exact solution
  • malware detection