Login / Signup
Obfuscation Using Tensor Products.
Craig Gentry
Charanjit S. Jutla
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
high order
higher order
reverse engineering
control flow
static analysis
data transformation
malware detection
tensor space
search engine
dimensionality reduction
diffusion tensor