-
1
-
-
79251578513
-
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2001. Full version available at http ://eprint.iacr.org/2001/069/.
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2001. Full version available at http ://eprint.iacr.org/2001/069/.
-
-
-
-
3
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Advances in Cryptology, CRYPTO '97, of, Springer-Verlag
-
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Advances in Cryptology - CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 455-469. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
6
-
-
34848837353
-
Correcting errors without leaking partial information. In 371
-
ACM Press
-
Y. Dodis and A. Smith. Correcting errors without leaking partial information. In 37"1 ACM Symposium on Theory of Computing, pages 654-663. ACM Press, 2005.
-
(2005)
ACM Symposium on Theory of Computing
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
7
-
-
35048896529
-
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
-
Theory of Cryptography, TCC 2004, of, Springer-Verlag
-
R. Gennaro, A. Lysyanskaya, T. Malkin, S. Micali, and T. Rabin. Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In Theory of Cryptography, TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 258-277. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 258-277
-
-
Gennaro, R.1
Lysyanskaya, A.2
Malkin, T.3
Micali, S.4
Rabin, T.5
-
8
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser and S. Micali. How to construct random functions. Journal of the ACM, 33(4), pages 210-217, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
11
-
-
33748600953
-
-
th IEEE Symposium on Foundations of Computer Science, pages 553-562. IEEE Computer Society, 2005.
-
th IEEE Symposium on Foundations of Computer Science, pages 553-562. IEEE Computer Society, 2005.
-
-
-
-
12
-
-
84937414062
-
Zero-knowledge and code obfuscation
-
Advances in Cryptology, ASI-ACRYPT 2000, of, Springer-Verlag
-
S. Hada. Zero-knowledge and code obfuscation. In Advances in Cryptology - ASI-ACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 443-457. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 443-457
-
-
Hada, S.1
-
14
-
-
84974720881
-
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
-
Fast Software Encryption, FSE 2000, of, Springer-Verlag
-
J. Katz and M. Yung. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. In Fast Software Encryption - FSE 2000, volume 1978 of Lecture Notes in Computer Science, pages 284-299. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
15
-
-
84939573910
-
Differential power analysis
-
Advances in Cryptology, CRYPTO '99, of, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
17
-
-
35048895442
-
Positive results and techniques for obfuscation
-
Advances in Cryptology, EUROCRYPT 2004, of, Springer-Verlag
-
B. Lynn, M. Prabhakaran, and A. Sahai. Positive results and techniques for obfuscation. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 20-39. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
18
-
-
35048852134
-
-
S. Micali and L. Reyzin. Physically observable cryptography (extended abstract). In Theory of Cryptography, TCC 2004, 2951 of Lecture Notes in Computer Science, pages 278-296. Springer-Verlag, 2004. Full version available at http ://eprint.iacr.org/2003/120/.
-
S. Micali and L. Reyzin. Physically observable cryptography (extended abstract). In Theory of Cryptography, TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer-Verlag, 2004. Full version available at http ://eprint.iacr.org/2003/120/.
-
-
-
-
20
-
-
84860559754
-
On the Limits of Point Function Obfuscation
-
May, Online available at
-
Arvind Narayanan and Vitaly Shmatikov. On the Limits of Point Function Obfuscation. IACR ePrint Archive, May 2006. Online available at http://eprint.iacr.org/2006/182.ps.
-
(2006)
IACR ePrint Archive
-
-
Narayanan, A.1
Shmatikov, V.2
-
21
-
-
0003508568
-
-
National Institute of Standards and Technology, FIPS Publication 46-2
-
National Institute of Standards and Technology. Data Encryption Standard (DES), 1993. FIPS Publication 46-2.
-
(1993)
Data Encryption Standard (DES)
-
-
-
22
-
-
33749549957
-
-
R. Pass and a. shelat and V. Vaikuntanathan. Construction of a Non-Malleable Encryption Scheme From Any Semantically Secure One. In Advances in Cryptology - CRYPTO '06, 4116 of Lecture Notes in Computer Science. Springer-Verlag, 2006.
-
R. Pass and a. shelat and V. Vaikuntanathan. Construction of a Non-Malleable Encryption Scheme From Any Semantically Secure One. In Advances in Cryptology - CRYPTO '06, volume 4116 of Lecture Notes in Computer Science. Springer-Verlag, 2006.
-
-
-
-
23
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Advances in Cryptology, CRYPTO '91, of, Springer-Verlag
-
C. Rackoff and D. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
|