-
1
-
-
84955621400
-
Tamper resistant software: An implementation
-
In Proc. 1st International Workshop on Information Hiding, Springer
-
D. Aucsmith, Tamper resistant software: an implementation. In Proc. 1st International Workshop on Information Hiding, volume 1174 of LNCS, pages 317-333. Springer, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
2
-
-
79251578513
-
On the (im) possibility of obfuscating programs
-
In Proc. Advances in Cryptology - CRYPTO 2001, Springer
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im) possibility of obfuscating programs. In Proc. Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 1-18. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
0001870201
-
Locally random reductions: Improvements and applications
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: improvements and applications. J. Cryptology, 10:17-36, 1997.
-
(1997)
J. Cryptology
, vol.10
, pp. 17-36
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
In Proc. Advances in Cryptology - EUROCRYPT 2004, Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Proc. Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 506-522. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
In Proc. Advances in Cryptology - CRYPTO 1997, Springer
-
R. Canetti. Towards realizing random oracles: hash functions that hide all partial information. In Proc. Advances in Cryptology - CRYPTO 1997, volume 1294 of LNCS, pages 455-469. Springer, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
7
-
-
24144487020
-
Towards privacy in public databases
-
In Proc. 2nd Theory of Cryptography Conference (TCC), Springer
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Towards privacy in public databases. In Proc. 2nd Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 363-385. Springer, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
8
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. J. ACM, 45(6):965-981, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
9
-
-
21144457759
-
White-box cryptography and an AES implementation
-
In 9th Annual International Workshop on Selected Areas in Cryptography (SAC), Springer
-
S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. White-box cryptography and an AES implementation. In 9th Annual International Workshop on Selected Areas in Cryptography (SAC), volume 2595 of LNCS, pages 250-270. Springer, 2003.
-
(2003)
LNCS
, vol.2595
, pp. 250-270
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.4
-
10
-
-
35248853376
-
A white-box des implementation for DRM applications
-
In ACM Digital Rights Management Workshop, Springer
-
S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. A white-box DES implementation for DRM applications. In ACM Digital Rights Management Workshop, volume 2696 of LNCS, pages 1-15. Springer, 2003.
-
(2003)
LNCS
, vol.2696
, pp. 1-15
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.4
-
11
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
C. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
12
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Department of Computer Sciences, The University of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Sciences, The University of Auckland, July 1997.
-
(1997)
Technical Report
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
13
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
ACM
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proc. 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), pages 184-196. ACM, 1998.
-
(1998)
In Proc. 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL)
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
16
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
In Proc. Advances in Cryptology - CRYPTO 1992, Springer
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail, In Proc. Advances in Cryptology - CRYPTO 1992, volume 740 of LNCS, pages 139-147. Springer, 1993.
-
(1993)
LNCS
, vol.740
, pp. 139-147
-
-
Naor, M.1
-
17
-
-
0032265905
-
Auditable metering with lightweight security
-
M. Franklin and D. Malkhi. Auditable metering with lightweight security. J. Computer Security, 6(4):237-255, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.4
, pp. 237-255
-
-
Franklin, M.1
Malkhi, D.2
-
18
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
ACM
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes, In Proc. 30th Annual ACM Symposium on Theory of Computing (STOC), pages 151-160. ACM, 1998,
-
(1998)
Proc. 30th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
19
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, 43(3):431-473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
20
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
In Proc. Advances in Cryptology - CRYPTO 2003, Springer
-
Y. Ishai, A. Sahai, and D. Wagner. Private circuits: securing hardware against probing attacks. In Proc. Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 463-481. Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
22
-
-
35048895442
-
Positive results and techniques for obfuscation
-
In Proc. Advances in Cryptology - EUROCRYPT 2004, Springer
-
B. Lynn, M. Prabhakaran, and A. Sahai. Positive results and techniques for obfuscation. In Proc. Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 20-39, Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
23
-
-
0003135570
-
Partial-match retrieval algorithms
-
R. Rivest. Partial-match retrieval algorithms. SIAM Journal of Computing, 5(1):19-50, 1976.
-
(1976)
SIAM Journal of Computing
, vol.5
, Issue.1
, pp. 19-50
-
-
Rivest, R.1
-
24
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
IEEE Computer Society
-
X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In Proc. IEEE Symposium on Security and Privacy, pages 78-92. IEEE Computer Society, 2003.
-
(2003)
Proc. IEEE Symposium on Security and Privacy
, pp. 78-92
-
-
Wang, X.1
Reiter, M.2
|