Login / Signup

Indistinguishability Obfuscation for Turing Machines with Unbounded Memory.

Venkata KoppulaAllison Bishop LewkoBrent Waters
Published in: STOC (2015)
Keyphrases
  • turing machine
  • memory requirements
  • computing power
  • low memory
  • memory usage
  • memory size
  • limited memory
  • main memory
  • reverse engineering
  • memory management
  • malware detection
  • rough sets