Sign in

Must You Know the Code of f to Securely Compute f?

Mike Rosulek
Published in: CRYPTO (2012)
Keyphrases
  • source code
  • neural network
  • error correction
  • data flow
  • code generation