Login / Signup
Implementing Token-Based Obfuscation under (Ring) LWE.
Cheng Chen
Nicholas Genise
Daniele Micciancio
Yuriy Polyakov
Kurt Rohloff
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
reverse engineering
digital libraries
computer vision
decision making
multiscale
probabilistic model
data flow
control flow