Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Searchable Encryption, Leakage-Abuse Attacks and Statistical Learning Theory [pdf] (ens.fr)
5 points by yyyk on Oct 29, 2019 | hide | past | favorite


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: