Date: 2017-04-03 15:56:44Computer programming Computing Mathematics Theoretical computer science Boolean algebra Error detection and correction Compiler construction Hash function Avalanche effect Optimizing compiler Recursion MD5 | | Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email: Add to Reading ListSource URL: www.ieee-security.orgDownload Document from Source Website File Size: 637,30 KBShare Document on Facebook
|