<--- Back to Details
First PageDocument Content
Security / Semantic security / Advantage / Secrecy / Proxy re-encryption / Obfuscation / RSA / Encryption / Hardware obfuscation / Cryptography / Cyberwarfare / Ciphertext indistinguishability
Date: 2010-02-04 10:25:07
Security
Semantic security
Advantage
Secrecy
Proxy re-encryption
Obfuscation
RSA
Encryption
Hardware obfuscation
Cryptography
Cyberwarfare
Ciphertext indistinguishability

Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡

Add to Reading List

Source URL: people.csail.mit.edu

Download Document from Source Website

File Size: 303,87 KB

Share Document on Facebook

Similar Documents

Operator theory / Obfuscation / Complex analysis / Partial differential equations / Analysis

YSKSeparation Kit Installation The YSK-8100 consists of sub-panel mounting hardware, microphone connecting hardware and three 6-m interconnecting cables for the sub-panel. This allows the main body to be installed

DocID: 1qwJm - View Document

Semiconductor devices / Electronic design / Hardware Trojan / Trojans / Electronic engineering / Field-programmable gate array / Integrated circuit / Cryptographic engineering / Trojan horse / Hardware obfuscation

SALWARE: Salutary Hardware to design Trusted IC Lilian Bossuet1, David Hely2 1 2

DocID: 1px28 - View Document

Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡

DocID: 1kNuY - View Document

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation

DocID: 1eL0u - View Document

Software / Obfuscated code / Source code / PreEmptive Solutions / Microsoft Visual Studio / ActionScript code protection / Hardware obfuscation / Computer programming / Obfuscation / Computing

Obfuscation Development Process

DocID: 14INh - View Document