-
1
On Best-Possible Obfuscation
Published 2021“…An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output functionality as the original program, but is “unintelligible”. …”
Get full text
Article -
2
-
3
-
4
On Best-Possible Obfuscation
Published 2014“…An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output functionality as the original program, but is “unintelligible”. …”
Get full text
Get full text
Article -
5
Obfuscation of Probabilistic Circuits and Applications
Published 2021“…For obfuscation, we propose a notion that extends indistinguishability obfuscation to probabilistic circuits: It should be hard to distinguish between the obfuscations of any two circuits whose output distributions at each input are computationally indistinguishable, possibly in presence of some auxiliary input. …”
Get full text
Article -
6
Program Obfuscation with Leaky Hardware
Published 2014“…(ii) The number of hardware devices used in an obfuscation and the amount of work they perform are polynomial in the security parameter independently of the obfuscated function’s complexity. …”
Get full text
Get full text
Article -
7
Software protection through obfuscation
Published 2015“…Another research area that can be explored in the future is to use the knowledge of obfuscation to detect obfuscated variants of known malwares. …”
Get full text
Thesis -
8
Data obfuscation by logic synthesis
Published 2016“…Even though there are no definite guarantees in data protection, it is possible to devise a complex data obfuscation technique to make retrieving the data from scratch time consuming and impractical. …”
Get full text
Final Year Project (FYP) -
9
Indistinguishability Obfuscation: From Approximate to Exact
Published 2017“…We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2+ϵ fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. …”
Get full text
Get full text
Get full text
Article -
10
Indistinguishability Obfuscation from Functional Encryption
Published 2018“…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Indistinguishability Obfuscation from Functional Encryption
Published 2021“…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
Get full text
Article -
13
Search, obfuscation, and price elasticities on the Internet
Published 2011Get full text
Working Paper -
14
Obfuscation, Learning, and the Evolution of Investor Sophistication
Published 2011“…Obfuscation decreases with competition among firms, since the information rents from obfuscation dissipate as each institution attracts a smaller market share.…”
Get full text
Article -
15
A Search Cost Model of Obfuscation
Published 2012“…Here, a signal-jamming mechanism can also lead to equilibrium obfuscation.…”
Get full text
Get full text
Article -
16
Obfuscation techniques for Java source code
Published 2015“…Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tamper-proofing, fingerprint code, virtual machine… Obfuscation is a very cheap and can be conducted at multiple levels of complexity and in multiple stages of a program. …”
Get full text
Get full text
Student Research Paper -
17
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
Published 2017Subjects: “…Indistinguishability Obfuscation…”
Get full text
-
18
-
19
-
20
Obfuscating Conjunctions under Entropic Ring LWE
Published 2017“…We view this as a first step towards proving the security of additional multilinear map based constructions, and in particular program obfuscators, under standard assumptions. Our scheme satisfies virtual black box (VBB) security, meaning that the obfuscated program reveals nothing more than black-box access to f as an oracle, at least as long as (essentially) the conjunction is chosen from a distribution having sufficient entropy.…”
Get full text
Get full text
Article