Login / Signup
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
Gilad Asharov
Gil Segev
Published in:
SIAM J. Comput. (2016)
Keyphrases
</>
encryption scheme
power consumption
reverse engineering
security analysis
data sets
public key
standard model
key exchange
functional verification
neural network
data sharing
secret key
encryption algorithm