Login / Signup
Must You Know the Code of f to Securely Compute f?
Mike Rosulek
Published in:
CRYPTO (2012)
Keyphrases
</>
source code
neural network
error correction
data flow
code generation