-
21
-
22
Indistinguishability Obfuscation from Functional Encryption
Published 2021“…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
Get full text
Article -
23
Search, obfuscation, and price elasticities on the Internet
Published 2011Get full text
Working Paper -
24
Obfuscation, Learning, and the Evolution of Investor Sophistication
Published 2011“…Obfuscation decreases with competition among firms, since the information rents from obfuscation dissipate as each institution attracts a smaller market share.…”
Get full text
Article -
25
A Search Cost Model of Obfuscation
Published 2012“…Here, a signal-jamming mechanism can also lead to equilibrium obfuscation.…”
Get full text
Get full text
Article -
26
Obfuscation techniques for Java source code
Published 2015“…Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tamper-proofing, fingerprint code, virtual machine… Obfuscation is a very cheap and can be conducted at multiple levels of complexity and in multiple stages of a program. …”
Get full text
Get full text
Student Research Paper -
27
-
28
The qualities of leadership: direction, communication, and obfuscation
Published 2007“…Sometimes leaders attract more attention by obfuscating their messages. A concern for party unity mitigates this incentive; when activists emphasize following the party line, they learn more about their environment.…”
Working paper -
29
The Qualities of Leadership: Direction, Communication, and Obfuscation.
Published 2008“…However, power-hungry leaders who need an audience sometimes obfuscate their messages, but less so when their followers place more emphasis on conformity than on doing the right thing.…”
Journal article -
30
Intellectual Property Protection using Obfuscation
Published 2010“…In this technical report, we discuss the use of code obfuscation as means of protecting the intellectual property of software. …”
Report -
31
The Qualities of Leadership: Direction, Communication, and Obfuscation
Published 2007“…Sometimes leaders attract more attention by obfuscating their messages. A concern for party unity mitigates this incentive; when activists emphasize following the party line, they learn more about their environment.…”
Working paper -
32
-
33
-
34
-
35
-
36
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
Published 2017Subjects: “…Indistinguishability Obfuscation…”
Get full text
-
37
-
38
-
39
Obfuscating Conjunctions under Entropic Ring LWE
Published 2017“…We view this as a first step towards proving the security of additional multilinear map based constructions, and in particular program obfuscators, under standard assumptions. Our scheme satisfies virtual black box (VBB) security, meaning that the obfuscated program reveals nothing more than black-box access to f as an oracle, at least as long as (essentially) the conjunction is chosen from a distribution having sufficient entropy.…”
Get full text
Get full text
Article -
40
Low complexity pseudorandom generators and indistinguishability obfuscation
Published 2018Get full text
Thesis