Login / Signup
Indistinguishability Obfuscation from Well-Founded Assumptions.
Aayush Jain
Huijia Lin
Amit Sahai
Published in:
Electron. Colloquium Comput. Complex. (2020)
Keyphrases
</>
reverse engineering
simplifying assumptions
malware detection
data structure
encryption scheme
expert systems
database views
underlying assumptions
independence assumption
control flow
data sets
case study
artificial intelligence
learning algorithm
real world
neural network
databases