-
1
-
-
5144221506
-
On the (im)possibility of obfuscating programs
-
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. Technical report, Electronic Colloquium on Computational Complexity, 2001. http://www.eccc.uni-trier.de/eccc.
-
(2001)
Technical Report, Electronic Colloquium on Computational Complexity
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
84955604812
-
Algorithms for black-box fields and their applications to cryptography
-
M. Wiener, editor Springer-Verlag, August
-
Dan Boneh and Richard Lipton. Algorithms for black-box fields and their applications to cryptography. In M. Wiener, editor, Advances in Cryptology-CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 283-297. Springer-Verlag, August 1996.
-
(1996)
Advances in Cryptology-CRYPTO '96, Volume 1109 of Lecture Notes in Computer Science
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.2
-
4
-
-
0031619016
-
The random oracle methodology, revisited
-
Dallas, 23-26 May
-
Ran Canetti, Oded Goldreich, and Shai Halevi. The random oracle methodology, revisited. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pages 209-218, Dallas, 23-26 May 1998.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
5
-
-
0041916251
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
University of Arizona, February
-
Christian Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. Technical Report TR00-03, The Department of Computer Science, University of Arizona, February 2000.
-
(2000)
Technical Report TR00-03, the Department of Computer Science
-
-
Collberg, C.1
Thomborson, C.2
-
6
-
-
0343337504
-
Nonmalleable cryptography
-
(electronic)
-
Danny Dolev, Cynthia Dwork, and Moni Naor. Nonmalleable cryptography. SIAM Journal on Computing, 30(2):391-437 (electronic), 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
8
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Santa Barbara, Calif. Springer, Berlin
-
Amos Fiat and Adi Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in cryptology-CRYPTO '86 (Santa Barbara, Calif., 1986), pages 186-194. Springer, Berlin, 1987.
-
(1986)
Advances in Cryptology-CRYPTO '86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
9
-
-
0022793132
-
How to construct random functions
-
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. Journal of the Association for Computing Machinery, 33(4):792-807, 1986.
-
(1986)
Journal of the Association for Computing Machinery
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
12
-
-
84937414062
-
Zero-knowledge and code obfuscation
-
T. Okamoto, editor Lecture Notes in Computer Science Kyoto, Japan International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
Satoshi Hada. Zero-knowledge and code obfuscation. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT '2000, Lecture Notes in Computer Science, pages 443-457, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany.
-
(2000)
Advances in Cryptology - ASIACRYPT '2000
, pp. 443-457
-
-
Hada, S.1
-
13
-
-
0033704913
-
Complete characterization of security notions for private-key encryption
-
Portland, OR, May ACM
-
Jonathan Katz and Moti Yung. Complete characterization of security notions for private-key encryption. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, pages 245-254, Portland, OR, May 2000. ACM.
-
(2000)
Proceedings of the 32nd Annual ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Katz, J.1
Yung, M.2
-
14
-
-
84889051784
-
How to copyright a function?
-
H. Imai and Y. Zheng, editors Springer-Verlag, March
-
David Naccache, Adi Shamir, and Julien P. Stern. How to copyright a function? In H. Imai and Y. Zheng, editors, Public Key Cryptography-PKC '99, volume 1560 of Lecture Notes in Computer Science, pages 188-196. Springer-Verlag, March 1999.
-
(1999)
Public Key Cryptography-PKC '99, Volume 1560 of Lecture Notes in Computer Science
, pp. 188-196
-
-
Naccache, D.1
Shamir, A.2
Stern, J.P.3
-
15
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
Miami Beach, Florida, 20-22 October IEEE
-
Moni Naor and Omer Reingold. Number-theoretic constructions of efficient pseudo-random functions. In 38th Annual Symposium on Foundations of Computer Science, pages 458-467, Miami Beach, Florida, 20-22 October 1997. IEEE.
-
(1997)
38th Annual Symposium on Foundations of Computer Science
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
16
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Workshop, Georgia Inst. Tech., Atlanta, Ga. Academic, New York
-
Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of secure computation (Workshop, Georgia Inst. Tech., Atlanta, Ga., 1977), pages 169-179. Academic, New York, 1978.
-
(1977)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
17
-
-
0033309271
-
1
-
New York, NY, 17-19 October IEEE
-
1. In 40th Annual Symposium on Foundations of Computer Science, pages 554-566, New York, NY, 17-19 October 1999. IEEE.
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 554-566
-
-
Sander, T.1
Young, A.2
Yung, M.3
|