Sign in
On Symmetric Encryption and Point Obfuscation.
Ran Canetti
Yael Tauman Kalai
Mayank Varia
Daniel Wichs
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
reverse engineering
sample points
bayesian networks
database
real time
optimal solution
hidden markov models