Indistinguishability obfuscation from circular security.
Romain GayRafael PassPublished in: STOC (2021)
Keyphrases
- encryption scheme
- malware detection
- security systems
- security issues
- hough transform
- information security
- information assurance
- security requirements
- access control
- security policies
- statistical databases
- static analysis
- intrusion detection
- computer security
- databases
- reverse engineering
- security threats
- security level
- security protocols
- anomaly detection
- security mechanisms
- data exchange
- security problems
- network security
- rfid tags