Login / Signup
Obfuscation for Cryptographic Purposes.
Dennis Hofheinz
John Malone-Lee
Martijn Stam
Published in:
TCC (2007)
Keyphrases
</>
smart card
reverse engineering
hash functions
artificial intelligence
key management
encryption key
real time
information retrieval
data structure
static analysis
control flow
security analysis
malware detection