• General Topics
    • Programming
    • Unix & Linux
    • System Administration & Network Administration
    • Information Security
    • Cryptography
    • Database Administration
    • Software Engineering
    • Theoretical Computer Science
    • General Computing
  • Tags
  • Recent Tag Groups
  • Recent Articles
  • Random Article

Tag: software-obfuscation


Found 18 results for 'software-obfuscation'.

  • Previous
  • 1
  • Next

1) functional-encryption - Practical consequences of using functional encryption for software obfuscation
2) randomness - Sub exponentially hard OWF , PRF and iO
3) protocol-design - Obfuscate an "I'll reveal if you do" function
4) software-obfuscation - Is obfuscation always reversable?
5) aes - Ways to make white-box cryptography AES implementation more difficult to be broken
6) software-obfuscation - Intuitively what makes indistinguishability obfuscation useful?
7) protocol-design - Obfuscating functions that are mostly zero
8) protocol-design - Universal Circuits in Indistinguishability Obfuscation Candidate Construction
9) aes - Is this protocol for masking DB ids sound?
10) algorithm-design - Is obfuscation considered a cryptographic primitive?
11) hash - Hash based code obfuscation?
12) lightweight - A situation where security by obscurity might be the best solution - or am I wrong?
13) software-obfuscation - Why do we use multilinear maps for obfuscation?
14) hash - Cryptographic function that can 'pack' numbers
15) software-obfuscation - Do reversible black box obfuscators exist?
16) software-obfuscation - Barak et al. proof that black-box obfuscation is impossible
17) terminology - What is Indistinguishability Obfuscation?
18) hash - Can the indistinguishability obfuscator leak the password when obfuscating the password checking function?


  • Previous
  • 1
  • Next


Article content is licensed under a Creative Commons Attribution 4.0 International License.
Site design copyright © 2023 Programmatic.Solutions.