Login / Signup
Implementing Conjunction Obfuscation under Entropic Ring LWE.
David Bruce Cousins
Giovanni Di Crescenzo
Kamil Doruk Gür
Kevin King
Yuriy Polyakov
Kurt Rohloff
Gerard W. Ryan
Erkay Savas
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
data transformation
machine learning
reverse engineering
real world
social networks
control flow