Login / Signup
When does Functional Encryption Imply Obfuscation?
Sanjam Garg
Mohammad Mahmoody
Ameer Mohammed
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
reverse engineering
encryption algorithms
neural network
encryption scheme
real time
databases
static analysis
secret key