Sign in

Implementing Conjunction Obfuscation Under Entropic Ring LWE.

David Bruce CousinsGiovanni Di CrescenzoKamil Doruk GürKevin KingYuriy PolyakovKurt RohloffGerard W. RyanErkay Savas
Published in: IEEE Symposium on Security and Privacy (2018)
Keyphrases
  • reverse engineering
  • efficient implementation
  • neural network
  • database
  • data sets
  • search engine
  • search algorithm
  • static analysis
  • algebraic structure
  • ring signature scheme