메뉴 건너뛰기




Volumn 2139 LNCS, Issue , 2001, Pages 1-18

On the (Im)possibility of obfuscating programs

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; POLYNOMIAL APPROXIMATION; PROGRAM COMPILERS; CRYPTOGRAPHY;

EID: 79251578513     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44647-8_1     Document Type: Conference Paper
Times cited : (902)

References (18)
  • 5
    • 0041916251 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • University of Arizona, February
    • Christian Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. Technical Report TR00-03, The Department of Computer Science, University of Arizona, February 2000.
    • (2000) Technical Report TR00-03, the Department of Computer Science
    • Collberg, C.1    Thomborson, C.2
  • 6
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • (electronic)
    • Danny Dolev, Cynthia Dwork, and Moni Naor. Nonmalleable cryptography. SIAM Journal on Computing, 30(2):391-437 (electronic), 2000.
    • (2000) SIAM Journal on Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 8
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Santa Barbara, Calif. Springer, Berlin
    • Amos Fiat and Adi Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in cryptology-CRYPTO '86 (Santa Barbara, Calif., 1986), pages 186-194. Springer, Berlin, 1987.
    • (1986) Advances in Cryptology-CRYPTO '86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 10
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 12
    • 84937414062 scopus 로고    scopus 로고
    • Zero-knowledge and code obfuscation
    • T. Okamoto, editor Lecture Notes in Computer Science Kyoto, Japan International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • Satoshi Hada. Zero-knowledge and code obfuscation. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT '2000, Lecture Notes in Computer Science, pages 443-457, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany.
    • (2000) Advances in Cryptology - ASIACRYPT '2000 , pp. 443-457
    • Hada, S.1
  • 13
    • 0033704913 scopus 로고    scopus 로고
    • Complete characterization of security notions for private-key encryption
    • Portland, OR, May ACM
    • Jonathan Katz and Moti Yung. Complete characterization of security notions for private-key encryption. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, pages 245-254, Portland, OR, May 2000. ACM.
    • (2000) Proceedings of the 32nd Annual ACM Symposium on Theory of Computing , pp. 245-254
    • Katz, J.1    Yung, M.2
  • 15
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Miami Beach, Florida, 20-22 October IEEE
    • Moni Naor and Omer Reingold. Number-theoretic constructions of efficient pseudo-random functions. In 38th Annual Symposium on Foundations of Computer Science, pages 458-467, Miami Beach, Florida, 20-22 October 1997. IEEE.
    • (1997) 38th Annual Symposium on Foundations of Computer Science , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 16
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • Workshop, Georgia Inst. Tech., Atlanta, Ga. Academic, New York
    • Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of secure computation (Workshop, Georgia Inst. Tech., Atlanta, Ga., 1977), pages 169-179. Academic, New York, 1978.
    • (1977) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.