Login / Signup
Functional Re-encryption and Collusion-Resistant Obfuscation.
Nishanth Chandran
Melissa Chase
Vinod Vaikuntanathan
Published in:
TCC (2012)
Keyphrases
</>
control flow
genetic algorithm
case study
reverse engineering
information hiding
ciphertext
encryption algorithm
random number
multimedia streaming
information systems
static analysis
digital signature
image encryption