Obfuscation

Results: 1117



#Item
21Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings Rafael Pass∗ abhi shelat†

Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings Rafael Pass∗ abhi shelat†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2015-04-24 09:25:33
    22Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1  Stanford University

    Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1 Stanford University

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2015-05-25 22:53:51
      23Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

      Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-07-29 01:21:17
        24Shorter Circuit Obfuscation in Challenging Security Models Zvika Brakerski∗ Or Dagmi∗  Abstract

        Shorter Circuit Obfuscation in Challenging Security Models Zvika Brakerski∗ Or Dagmi∗ Abstract

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-04-27 05:37:11
          25Seeing through Network-Protocol Obfuscation Liang Wang Kevin P. Dyer  Aditya Akella

          Seeing through Network-Protocol Obfuscation Liang Wang Kevin P. Dyer Aditya Akella

          Add to Reading List

          Source URL: pages.cs.wisc.edu

          - Date: 2015-10-02 01:38:19
            26Optimizing Obfuscation: Avoiding Barrington’s Theorem † Prabhanjan Ananth Department of Computer Science and Center for Encrypted Functionalities,

            Optimizing Obfuscation: Avoiding Barrington’s Theorem † Prabhanjan Ananth Department of Computer Science and Center for Encrypted Functionalities,

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2014-09-29 14:03:08
              27One-Way Functions and (Im)perfect Obfuscation∗ Ilan Komargodski† Tal Moran‡  Moni Naor†

              One-Way Functions and (Im)perfect Obfuscation∗ Ilan Komargodski† Tal Moran‡ Moni Naor†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-07-20 05:44:28
                28Differing-Inputs Obfuscation and Applications Prabhanjan Ananth Dan Boneh  Sanjam Garg

                Differing-Inputs Obfuscation and Applications Prabhanjan Ananth Dan Boneh Sanjam Garg

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-06-16 21:33:44
                  29Patchable Obfuscation Prabhanjan Ananth∗ Abhishek Jain†  Amit Sahai‡

                  Patchable Obfuscation Prabhanjan Ananth∗ Abhishek Jain† Amit Sahai‡

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-11-08 05:53:42
                    30On Statistically Secure Obfuscation with Approximate Correctness Zvika Brakerski∗1 , Christina Brzuska†‡2 , and Nils Fleischhacker§‡3 1 2

                    On Statistically Secure Obfuscation with Approximate Correctness Zvika Brakerski∗1 , Christina Brzuska†‡2 , and Nils Fleischhacker§‡3 1 2

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-06-09 08:18:35