Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
Search by expertise, name or affiliation
Implementing Conjunction Obfuscation under Entropic Ring LWE
David Bruce Cousins
, Giovanni Di Crescenzo
, Kamil Doruk Gur
, Kevin King
, Yuriy Polyakov
,
Kurt Rohloff
, Gerard W. Ryan
, Erkay Savas
Computer Science
Cybersecurity Research Center
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
16
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Implementing Conjunction Obfuscation under Entropic Ring LWE'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Obfuscation
100%
Ring-LWE
100%
Code Obfuscation
30%
32-bit
20%
Computing Environment
10%
Order of Magnitude
10%
Commercially Available
10%
Security Model
10%
Multicore Computing
10%
Desktop Computer
10%
Hardness Assumptions
10%
Point Function
10%
Cryptographic Scheme
10%
Multiple Design
10%
64-bit
10%
Arbitrary Inputs
10%
Polynomial Ring
10%
Program Size
10%
Obfuscation Techniques
10%
Indistinguishability Obfuscation
10%
Weak Security
10%
Virtual Black-box
10%
Point Support
10%
Branching Programs
10%
Lattice Trapdoors
10%
Computer Science
Obfuscation
100%
Security Model
12%
Multicore
12%
Computing Environment
12%
Desktop Computer
12%
Function Point
12%
Multiple Design
12%
Learning with Errors
12%
Obfuscation Technique
12%