Showing 1 - 20 results of 163 for search '"obfuscation"', query time: 0.06s Refine Results
  1. 1

    On Best-Possible Obfuscation by Goldwasser, Shafrira, Rothblum, Guy N.

    Published 2021
    “…An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output functionality as the original program, but is “unintelligible”. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    On Best-Possible Obfuscation by Goldwasser, Shafi, Rothblum, Guy N.

    Published 2014
    “…An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output functionality as the original program, but is “unintelligible”. …”
    Get full text
    Get full text
    Article
  5. 5

    Obfuscation of Probabilistic Circuits and Applications by Ananth, Prabhanjan, Brakerski, Zvika, Segev, Gil, Vaikuntananthan, Vinod

    Published 2021
    “…For obfuscation, we propose a notion that extends indistinguishability obfuscation to probabilistic circuits: It should be hard to distinguish between the obfuscations of any two circuits whose output distributions at each input are computationally indistinguishable, possibly in presence of some auxiliary input. …”
    Get full text
    Article
  6. 6

    Program Obfuscation with Leaky Hardware by Bitansky, Nir, Canetti, Ran, Goldwasser, Shafi, Halevi, Shai, Kalai, Yael Tauman, Rothblum, Guy N.

    Published 2014
    “…(ii) The number of hardware devices used in an obfuscation and the amount of work they perform are polynomial in the security parameter independently of the obfuscated function’s complexity. …”
    Get full text
    Get full text
    Article
  7. 7

    Software protection through obfuscation by Balachandran, Vivek

    Published 2015
    “…Another research area that can be explored in the future is to use the knowledge of obfuscation to detect obfuscated variants of known malwares. …”
    Get full text
    Thesis
  8. 8

    Data obfuscation by logic synthesis by Tan, Stella Pei Fen

    Published 2016
    “…Even though there are no definite guarantees in data protection, it is possible to devise a complex data obfuscation technique to make retrieving the data from scratch time consuming and impractical. …”
    Get full text
    Final Year Project (FYP)
  9. 9

    Indistinguishability Obfuscation: From Approximate to Exact by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2017
    “…We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2+ϵ fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Indistinguishability Obfuscation from Functional Encryption by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2018
    “…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Indistinguishability Obfuscation from Functional Encryption by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. …”
    Get full text
    Article
  13. 13
  14. 14

    Obfuscation, Learning, and the Evolution of Investor Sophistication by Carlin, Bruce Ian, Manso, Gustavo

    Published 2011
    “…Obfuscation decreases with competition among firms, since the information rents from obfuscation dissipate as each institution attracts a smaller market share.…”
    Get full text
    Article
  15. 15

    A Search Cost Model of Obfuscation by Ellison, Glenn, Wolitzky, Alexander Greenberg

    Published 2012
    “…Here, a signal-jamming mechanism can also lead to equilibrium obfuscation.…”
    Get full text
    Get full text
    Article
  16. 16

    Obfuscation techniques for Java source code by Nguyen, Dinh Phuc

    Published 2015
    “…Some of them can be listed out such as watermarking, embedding decryption keys in hardware, tamper-proofing, fingerprint code, virtual machine… Obfuscation is a very cheap and can be conducted at multiple levels of complexity and in multiple stages of a program. …”
    Get full text
    Get full text
    Student Research Paper
  17. 17
  18. 18
  19. 19
  20. 20

    Obfuscating Conjunctions under Entropic Ring LWE by Brakerski, Zvika, Vaikuntanathan, Vinod, Wee, Hoeteck, Wichs, Daniel

    Published 2017
    “…We view this as a first step towards proving the security of additional multilinear map based constructions, and in particular program obfuscators, under standard assumptions. Our scheme satisfies virtual black box (VBB) security, meaning that the obfuscated program reveals nothing more than black-box access to f as an oracle, at least as long as (essentially) the conjunction is chosen from a distribution having sufficient entropy.…”
    Get full text
    Get full text
    Article