搜索结果: 1-7 共查到“军事学 program obfuscation”相关记录7条 . 查询时间(0.062 秒)
Sum-of-Squares Meets Program Obfuscation, Revisited
Sum-of-Squares Indistinguishability Obfuscation
font style='font-size:12px;'>
2019/1/2
We develop attacks on the security of variants of pseudo-random generators computed by quadratic polynomials. In particular we give a general condition for breaking the one-way property of mappings wh...
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
obfuscation multi-input functional encryption
font style='font-size:12px;'>
2017/9/1
Program obfuscation is a powerful security primitive with many applications. White-box cryptography studies a particular subset of program obfuscation targeting keyed pseudorandom functions (PRFs), a ...
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
pseudorandom generators local computation obfuscation
font style='font-size:12px;'>
2017/4/12
As a corollary, we refute some conjectures recently made in the cryptographic literature. This includes refuting the assumptions underlying Lin and Tessaro's recently proposed candidate construction f...
Implementing Cryptographic Program Obfuscation
implementation obfuscation
font style='font-size:12px;'>
2016/1/6
Program obfuscation is the process of making a program “unintelligible” without changing
the program’s underlying input/output behavior. Although there is a long line of work on
heuristic techniques...
Incremental Program Obfuscation
Obfuscation Incremental Cryptography
font style='font-size:12px;'>
2015/12/22
Recent advances in program obfuscation suggest that it is possible to create software that
can provably safeguard secret information. However, software systems usually contain large
executable code ...
Program Obfuscation with Leaky Hardware
Obfuscation Hardware Leakage-Resilience
font style='font-size:12px;'>
2012/6/14
We consider general program obfuscation mechanisms using ``somewhat trusted'' hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifica...
Program Obfuscation with Leaky Hardware
Obfuscation Hardware Leakage-Resilience
font style='font-size:12px;'>
2012/3/20
We consider general program obfuscation mechanisms using ``somewhat trusted'' hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifica...