Login / Signup
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
Gilad Asharov
Gil Segev
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
encryption scheme
power consumption
reverse engineering
static analysis
security analysis
secret key
standard model
encryption algorithms
database
fuzzy rules
public key