Indistinguishability Obfuscation from Circular Security.
Romain GayRafael PassPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- encryption scheme
- malware detection
- information security
- security analysis
- information assurance
- access control
- security problems
- statistical databases
- security management
- security requirements
- reverse engineering
- network security
- security threats
- security policies
- computer security
- intrusion detection
- key management
- security level
- security model
- static analysis
- security issues
- user authentication
- cyber security
- data mining
- unauthorized access
- object oriented