Obfuscation

Results: 1117



#Item
441Public-key cryptography / IP / One-way function / Communications protocol / Fuse / Cryptography / Homomorphic encryption / Zero-knowledge proof

On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky∗ and Omer Paneth† Tel Aviv University and Boston University April 23, 2015 This is an out of date draft that is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-23 15:21:41
442Source code / Computing / Four-square cipher / Pezizomycetes / Computer programming / Obfuscated code / Obfuscation

Norseman News Leif Ericson Viking Ship Norseman Vol. 16 No. 2 Sumer 2008 Edition

Add to Reading List

Source URL: www.vikingship.org

Language: English - Date: 2009-02-05 22:51:47
443Internet privacy / Peer-to-peer / Privacy / Location obfuscation / Ethics / File sharing networks / Cloaking

Enabling Private Continuous Queries For Revealed User Locations ⋆ Chi-Yin Chow and Mohamed F. Mokbel Department of Computer Science and Engineering, University of Minnesota {cchow, mokbel}@cs.umn.edu

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:41
444Electronic commerce / Cryptographic protocols / RSA / Cipher / Zero-knowledge proof / PP / Cryptography / Public-key cryptography / Homomorphic encryption

Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M¨ uller-Quade, and Tobias Nilges Karlsruhe Institute of Technology, Karlsruhe, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-16 05:13:26
445Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code

Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-08 09:17:59
446Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Software engineering / Computing

 D %C3H3IQ1MWZ T:O2KSOZ 5DKUZ

Add to Reading List

Source URL: www.complex.nbi.dk

Language: English - Date: 2010-08-24 05:28:51
447Complexity classes / Obfuscation / Circuit complexity / Obfuscated code / Ciphertext indistinguishability / International Obfuscated C Code Contest / NC / Semantic security / Multilinear map / Theoretical computer science / Computer programming / Computational complexity theory

Survey on Cryptographic Obfuscation M´at´e Horv´ath∗ Laboratory of Cryptography and System Security (CrySyS Lab)† April 24, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-24 07:02:48
448Complexity classes / Cryptographic protocols / Zero-knowledge proof / Interactive proof system / Soundness / NP / IP / Commitment scheme / P/poly / Theoretical computer science / Computational complexity theory / Cryptography

Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation Kai-Min Chung∗ Huijia Lin†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 08:37:34
449Obfuscation / Cryptographic software / Law / Copy protection / Digital rights management / Obfuscated code / Encryption / Software cracking / Source code / Warez / Computing / Computer programming

Security That Works Printer friendly version .NET Intellectual Property Protection The Merits of “True Encryption”

Add to Reading List

Source URL: www.crypkey.com

Language: English - Date: 2014-11-24 15:33:32
450Obfuscated code / Obfuscation / Source code / International Obfuscated C Code Contest / Computer programming / Computing / Software engineering

I t z i k K o t l e r | M a yLet Me Stuxnet You Itzik Kotler C TO , S e c u r i t y A r t

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-28 00:11:34
UPDATE