Login / Signup
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input.
Christina Brzuska
Arno Mittelbach
Published in:
ASIACRYPT (2) (2014)
Keyphrases
</>
reverse engineering
static analysis
control flow
data transformation
malware detection
databases
neural network
user input
artificial intelligence
rough sets
computer systems
equivalence relation