Introduction.- Background.- Definitional Approaches.- Bootstrapping.- Building Core-Obfuscators.- Building Functional Encryption.- iO Combiners and Universal Constructions.
przeczytaj całość
Introduction.- Background.- Definitional Approaches.- Bootstrapping.- Building Core-Obfuscators.- Building Functional Encryption.- iO Combiners and Universal Constructions.
ukryj opis
Recenzja