Login / Signup
Survey on Cryptographic Obfuscation.
Máté Horváth
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
reverse engineering
artificial intelligence
data collection
real time
neural network
real world
information retrieval
hash functions
literature review
security protocols
data transformation
key management
cross sectional
control flow