How to Use Quantum Indistinguishability Obfuscation.
Andrea ColadangeloSam GunnPublished in: CoRR (2023)
Keyphrases
- reverse engineering
- quantum computing
- database views
- quantum inspired
- static analysis
- encryption scheme
- quantum mechanics
- quantum computation
- control flow
- data transformation
- artificial intelligence
- channel capacity
- malware detection
- quantum evolutionary algorithm
- data sets
- logic circuits
- peer to peer
- database systems
- knowledge base
- information systems
- social networks
- data mining