Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation.
Wenpan JingXianhui LuBao LiPublished in: Inscrypt (2016)
Keyphrases
- canonical correlation analysis
- reverse engineering
- hash functions
- static analysis
- theorem prover
- data structure
- theorem proving
- b tree
- encryption scheme
- database views
- data transformation
- mathematical proofs
- control flow
- hash table
- malware detection
- hashing algorithm
- fuzzy sets
- hamming distance
- least squares
- feature extraction
- formal proof