Login / Signup
Indistinguishability obfuscation from well-founded assumptions.
Aayush Jain
Huijia Lin
Amit Sahai
Published in:
STOC (2021)
Keyphrases
</>
reverse engineering
real time
malware detection
database
data sets
neural network
artificial intelligence
data model
open source
restrictive assumptions