Login / Signup
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory.
Venkata Koppula
Allison Bishop Lewko
Brent Waters
Published in:
STOC (2015)
Keyphrases
</>
turing machine
memory requirements
computing power
low memory
memory usage
memory size
limited memory
main memory
reverse engineering
memory management
malware detection
rough sets