Login / Signup

Leakage-Resilient Public-Key Encryption from Obfuscation.

Dana Dachman-SoledS. Dov GordonFeng-Hao LiuAdam O'NeillHong-Sheng Zhou
Published in: Public Key Cryptography (2) (2016)
Keyphrases
  • public key encryption
  • public key
  • reverse engineering
  • proxy re encryption
  • encryption scheme
  • malware detection
  • e government
  • access control
  • smart card