Login / Signup
Two-round secure MPC from Indistinguishability Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mariana Raykova
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
encryption scheme
block cipher
reverse engineering
covert channel
security requirements
closed loop
dynamic model
standard model
security issues
data encryption
authentication scheme
security mechanisms
malware detection
security level
security analysis
lightweight
static analysis
privacy preserving