Showing 41 - 60 results of 222 for search '"obfuscation"', query time: 0.06s Refine Results
  1. 41
  2. 42

    Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation by Chen, Yilei, Hhan, Minki, Vaikuntanathan, Vinod, Wee, Hoeteck

    Published 2021
    “…Matrix PRFs are attractive due to their simplicity, strong connections to complexity theory and group theory, and recent applications in program obfuscation. Our main results are:We present constructions of matrix PRFs based on the conjectured hardness of computational problems pertaining to matrix products.We show that any matrix PRF that is computable by a read-c, width w branching program can be broken in time poly this means that any matrix PRF based on constant-width matrices must read each input bit ωc times. …”
    Get full text
    Book
  3. 43

    Structure vs. Hardness Through the Obfuscation Lens by Bitansky, Nir, Degwekar, Akshay, Vaikuntanathan, Vinod

    Published 2021
    “…In fact, we first show that even the very powerful notion of Indistinguishability Obfuscation (IO) does not imply such hard problems, and then deduce the same for a large class of primitives that can be constructed from IO.…”
    Get full text
    Article
  4. 44

    Structure Versus Hardness Through the Obfuscation Lens by Bitansky, Nir, Degwekar, Akshay, Vaikuntanathan, Vinod

    Published 2022
    “…In fact, we first show that even the very powerful notion of indistinguishability obfuscation (IO) does not imply such hard problems, and then deduce the same for a large class of primitives that can be constructed from IO.…”
    Get full text
    Article
  5. 45
  6. 46
  7. 47
  8. 48

    Software code protection through software obfuscation by Liang, Shan

    Published 2010
    “…We also discuss how the novel methods improve the obfuscation efficiency in comparison with the existing competing obfuscation methods.…”
    Get full text
    Thesis
  9. 49

    Obfuscating the topical intention in enterprise text search by Pang, Hwee Hwa, Xiao, Xiaokui, Shen, Jiali

    Published 2013
    “…To safeguard the enterprise from consequences arising from a disclosure of the query traces, it is desirable to obfuscate the true user intention from the search engine, without requiring it to be re-engineered. …”
    Get full text
    Get full text
    Conference Paper
  10. 50

    On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation by Bitansky, Nir, Paneth, Omer

    Published 2016
    “…(CRYPTO 2001) to the case of obfuscation with approximate functionality, thus settling a question left open by Barak et al. …”
    Get full text
    Get full text
    Article
  11. 51

    The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator by Bitansky, Nir, Canetti, Ran, Cohn, Henry, Goldwasser, Shafi, Kalai, Yael Tauman, Paneth, Omer, Rosen, Alon

    Published 2021
    “…In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat counterintuitively, strong impossibility results for virtual black box obfuscation. …”
    Get full text
    Article
  12. 52
  13. 53

    Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation by Lombardi, Alex, Vaikuntanathan, Vinod

    Published 2021
    “…Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a non-standard assumption on “Goldreich-like” pseudorandom generators. …”
    Get full text
    Article
  14. 54

    On the Capacity of Scalar Gaussian Channels Subject to State Obfuscation by Lev, Omri Yaacov

    Published 2024
    “…The problem of communication over multiple variants of the scalar Gaussian fading channel subject to a state-obfuscation constraint imposed in the form of near independence between the channel outputs and the channel coefficients has been studied. …”
    Get full text
    Thesis
  15. 55
  16. 56

    Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation by Canetti, Ran, Goldwasser, Shafi, Poburinnaya, Oxana

    Published 2021
    “…It requires a global (nonprogrammable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. …”
    Get full text
    Book
  17. 57

    Obfuscation and watermarking of FPGA designs based on constant value generators by Sergeichik, Vladimir V., Ivaniuk, Alexander A., Chang, Chip-Hong

    Published 2015
    “…Obfuscation is a technique which makes design less intelligible in order to prevent or increase reverse engineering effort. …”
    Get full text
    Get full text
    Get full text
    Conference Paper
  18. 58
  19. 59

    Graph-based analysis for hardware obfuscation through logic locking by Huang, Erdong

    Published 2023
    “…Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to address these concerns. …”
    Get full text
    Final Year Project (FYP)
  20. 60

    Streamlining DNN obfuscation to defend against model stealing attacks by Sun, Yidan, Lam, Siew-Kei, Jiang, Guiyuan, He, Peilan

    Published 2024
    “…In this work, we study the impact of various obfuscation levels on the defence effectiveness, and present a streamlined DNN obfuscation process that is extremely fast and is agnostic to any attack models. …”
    Get full text
    Get full text
    Conference Paper