Sign in

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.

Gilad AsharovGil Segev
Published in: SIAM J. Comput. (2016)
Keyphrases
  • encryption scheme
  • power consumption
  • reverse engineering
  • security analysis
  • data sets
  • public key
  • standard model
  • key exchange
  • functional verification
  • neural network
  • data sharing
  • secret key
  • encryption algorithm