Login / Signup

Indistinguishability obfuscation from well-founded assumptions.

Aayush JainHuijia LinAmit Sahai
Published in: STOC (2021)
Keyphrases
  • reverse engineering
  • real time
  • malware detection
  • database
  • data sets
  • neural network
  • artificial intelligence
  • data model
  • open source
  • restrictive assumptions