-
1
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
2
-
-
38049015775
-
-
Goldwasser, S., Rothblum, G.N.: On best-possible obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 194-213. Springer, Heidelberg (2007)
-
Goldwasser, S., Rothblum, G.N.: On best-possible obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
-
-
-
-
3
-
-
38049056625
-
-
Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purposes. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 214-232. Springer, Heidelberg (2007)
-
Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purposes. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
38049073133
-
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 233-252. Springer, Heidelberg (2007)
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
-
-
-
-
5
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input. In: FOCS
-
Los Alamitos
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553-562. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Computer Society
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
6
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
7
-
-
0031624874
-
Perfectly one-way probabilistic hash functions
-
Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions. In: Proceedings of the 30th ACM Symposium on Theory of Computing, pp. 131-140 (1998)
-
(1998)
Proceedings of the 30th ACM Symposium on Theory of Computing
, pp. 131-140
-
-
Canetti, R.1
Micciancio, D.2
Reingold, O.3
-
8
-
-
35048895442
-
Positive results and techniques for obfuscation
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Lynn, B.Y.S., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 20-39
-
-
Lynn, B.Y.S.1
Prabhakaran, M.2
Sahai, A.3
-
10
-
-
44449095554
-
Obfuscating point functions with multibit output
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Canetti, R., Dakdouk, R.R.: Obfuscating point functions with multibit output. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489-508. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 489-508
-
-
Canetti, R.1
Dakdouk, R.R.2
-
11
-
-
34848837353
-
Correcting errors without leaking partial information
-
Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: STOC, pp. 654-663 (2005)
-
(2005)
STOC
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
12
-
-
38049032820
-
-
Adida, B., Wikström, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 555-574. Springer, Heidelberg (2007)
-
Adida, B., Wikström, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
-
-
-
-
13
-
-
70350649061
-
-
Shen, E., Shi, E.,Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 457-473. Springer, Heidelberg (2009)
-
Shen, E., Shi, E.,Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457-473. Springer, Heidelberg (2009)
-
-
-
-
14
-
-
70350337335
-
Short and stateless signatures from the rsa assumption
-
Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
Hohenberger, S., Waters, B.: Short and stateless signatures from the rsa assumption. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 654-670. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 654-670
-
-
Hohenberger, S.1
Waters, B.2
-
15
-
-
72449205531
-
Signature schemes with bounded leakage resilience
-
Matsui, M, ed, ASIACRYPT 2009, Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Signature schemes with bounded leakage resilience. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 703-720. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
17
-
-
77949644510
-
On symmetric encryption and point obfuscation
-
Micciancio, D, ed, TCC 2010, Springer, Heidelberg 2010
-
Canetti, R., Kalai, Y., Varia, M., Wichs, D.: On symmetric encryption and point obfuscation. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 52-71. Springer, Heidelberg (2010)
-
LNCS
, vol.5978
, pp. 52-71
-
-
Canetti, R.1
Kalai, Y.2
Varia, M.3
Wichs, D.4
-
18
-
-
84900585814
-
-
Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS. The Internet Society (2000)
-
Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS. The Internet Society (2000)
-
-
-
|