Login / Signup
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
Gilad Asharov
Gil Segev
Published in:
FOCS (2015)
Keyphrases
</>
encryption scheme
power consumption
reverse engineering
neural network
database
data sharing
database views
peer to peer
information hiding
malware detection
encryption algorithms
chaotic sequence
functional verification