메뉴 건너뛰기




Volumn 4392 LNCS, Issue , 2007, Pages 214-232

Obfuscation for cryptographic purposes

Author keywords

Obfuscation; Point functions

Indexed keywords

FORMAL LOGIC; PROBABILISTIC LOGICS;

EID: 38049056625     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70936-7_12     Document Type: Conference Paper
Times cited : (50)

References (26)
  • 1
    • 79251578513 scopus 로고    scopus 로고
    • B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2001. Full version available at http ://eprint.iacr.org/2001/069/.
    • B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2001. Full version available at http ://eprint.iacr.org/2001/069/.
  • 3
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • Advances in Cryptology, CRYPTO '97, of, Springer-Verlag
    • R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 455-469. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 6
    • 34848837353 scopus 로고    scopus 로고
    • Correcting errors without leaking partial information. In 371
    • ACM Press
    • Y. Dodis and A. Smith. Correcting errors without leaking partial information. In 37"1 ACM Symposium on Theory of Computing, pages 654-663. ACM Press, 2005.
    • (2005) ACM Symposium on Theory of Computing , pp. 654-663
    • Dodis, Y.1    Smith, A.2
  • 7
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
    • Theory of Cryptography, TCC 2004, of, Springer-Verlag
    • R. Gennaro, A. Lysyanskaya, T. Malkin, S. Micali, and T. Rabin. Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In Theory of Cryptography, TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 258-277. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.3    Micali, S.4    Rabin, T.5
  • 10
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 11
    • 33748600953 scopus 로고    scopus 로고
    • th IEEE Symposium on Foundations of Computer Science, pages 553-562. IEEE Computer Society, 2005.
    • th IEEE Symposium on Foundations of Computer Science, pages 553-562. IEEE Computer Society, 2005.
  • 12
    • 84937414062 scopus 로고    scopus 로고
    • Zero-knowledge and code obfuscation
    • Advances in Cryptology, ASI-ACRYPT 2000, of, Springer-Verlag
    • S. Hada. Zero-knowledge and code obfuscation. In Advances in Cryptology - ASI-ACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 443-457. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 443-457
    • Hada, S.1
  • 14
    • 84974720881 scopus 로고    scopus 로고
    • Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
    • Fast Software Encryption, FSE 2000, of, Springer-Verlag
    • J. Katz and M. Yung. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. In Fast Software Encryption - FSE 2000, volume 1978 of Lecture Notes in Computer Science, pages 284-299. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 284-299
    • Katz, J.1    Yung, M.2
  • 15
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Advances in Cryptology, CRYPTO '99, of, Springer-Verlag
    • P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 17
    • 35048895442 scopus 로고    scopus 로고
    • Positive results and techniques for obfuscation
    • Advances in Cryptology, EUROCRYPT 2004, of, Springer-Verlag
    • B. Lynn, M. Prabhakaran, and A. Sahai. Positive results and techniques for obfuscation. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 20-39. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 20-39
    • Lynn, B.1    Prabhakaran, M.2    Sahai, A.3
  • 18
    • 35048852134 scopus 로고    scopus 로고
    • S. Micali and L. Reyzin. Physically observable cryptography (extended abstract). In Theory of Cryptography, TCC 2004, 2951 of Lecture Notes in Computer Science, pages 278-296. Springer-Verlag, 2004. Full version available at http ://eprint.iacr.org/2003/120/.
    • S. Micali and L. Reyzin. Physically observable cryptography (extended abstract). In Theory of Cryptography, TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer-Verlag, 2004. Full version available at http ://eprint.iacr.org/2003/120/.
  • 20
    • 84860559754 scopus 로고    scopus 로고
    • On the Limits of Point Function Obfuscation
    • May, Online available at
    • Arvind Narayanan and Vitaly Shmatikov. On the Limits of Point Function Obfuscation. IACR ePrint Archive, May 2006. Online available at http://eprint.iacr.org/2006/182.ps.
    • (2006) IACR ePrint Archive
    • Narayanan, A.1    Shmatikov, V.2
  • 21
    • 0003508568 scopus 로고
    • National Institute of Standards and Technology, FIPS Publication 46-2
    • National Institute of Standards and Technology. Data Encryption Standard (DES), 1993. FIPS Publication 46-2.
    • (1993) Data Encryption Standard (DES)
  • 22
    • 33749549957 scopus 로고    scopus 로고
    • R. Pass and a. shelat and V. Vaikuntanathan. Construction of a Non-Malleable Encryption Scheme From Any Semantically Secure One. In Advances in Cryptology - CRYPTO '06, 4116 of Lecture Notes in Computer Science. Springer-Verlag, 2006.
    • R. Pass and a. shelat and V. Vaikuntanathan. Construction of a Non-Malleable Encryption Scheme From Any Semantically Secure One. In Advances in Cryptology - CRYPTO '06, volume 4116 of Lecture Notes in Computer Science. Springer-Verlag, 2006.
  • 23
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Advances in Cryptology, CRYPTO '91, of, Springer-Verlag
    • C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.