How to Use Quantum Indistinguishability Obfuscation.
Andrea ColadangeloSam GunnPublished in: STOC (2024)
Keyphrases
- reverse engineering
- quantum computation
- encryption scheme
- quantum mechanics
- quantum computing
- quantum inspired
- evolutionary algorithm
- database views
- logic circuits
- quantum evolutionary algorithm
- static analysis
- control flow
- malware detection
- data transformation
- probability ranking principle
- databases
- low power
- knowledge base
- data mining