Back to Results
First PageMeta Content
Complexity classes / Computability theory / Theory of computation / Pseudorandomness / Models of computation / Obfuscated code / Oracle machine / Algorithm / P / Theoretical computer science / Computational complexity theory / Applied mathematics


On the (Im)possibility of Obfuscating Programs∗ Boaz Barak† Oded Goldreich‡ Amit Sahaik
Add to Reading List

Document Date: 2012-08-02 17:50:31


Open Document

File Size: 593,23 KB

Share Result on Facebook

City

La Jolla / Rehovot / Pittsburgh / Cambridge / /

Company

Fiat / Google Inc. / /

Country

Israel / /

/

Facility

Princeton University / Carnegie Mellon University / Weizmann Institute of Science / University of California / Harvard University / /

IndustryTerm

direct applications / software protection / potential applications / natural protocols / probabilistic algorithm / keyed-algorithms / inverse algorithm / software / above applications / cryptographic and complexity-theoretic applications / software watermarking / inverse algorithms / encryption algorithm / /

Organization

UCLA / Los Angeles / School of Engineering and Applied Sciences / Center for Research / Harvard University / Bob / Department of Computer Science / US Federal Reserve / Alice / Organization of the Paper / Princeton University / Carnegie Mellon University / Computer Science Department / Organization of the Paper In Section / University of California / San Diego / Weizmann Institute of Science / /

Person

Boaz Barak / Russell Impagliazzo§ Salil Vadhan / Oded Goldreich / Amit Sahaik Russell Impagliazzo / Steven Rudich / /

Position

ASCII/Morse code translator / programmer / /

ProgrammingLanguage

C / /

ProvinceOrState

New Jersey / Pennsylvania / California / Massachusetts / /

RadioStation

7 Thus AM / /

Technology

encryption / cryptography / arguably natural protocols / inverse algorithm / public key / 3 Transforming Private-Key Encryption / 29 6 Obfuscating Sampling Algorithms / Public-Key Encryption / encryption algorithm / factoring algorithm / ASCII / secret key / /

SocialTag