Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation.
Sanjam GargAntigoni PolychroniadouPublished in: TCC (2) (2015)
Keyphrases
- encryption scheme
- block cipher
- closed loop
- reverse engineering
- database views
- dynamic model
- security issues
- unauthorized access
- lightweight
- static analysis
- security analysis
- key management
- covert channel
- security mechanisms
- secret key
- public key
- control flow
- malware detection
- object oriented
- data mining
- data encryption
- neural network