Obfuscation for Cryptographic Purposes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Cryptographic Obfuscation

The recent result of Garg et al. (FOCS 2013) changed the previously pessimistic attitude towards general purpose cryptographic obfuscation. Since their first candidate construction, several authors proposed newer and newer schemes with more persuasive security arguments and better efficiency. At the same time, indistinguishability obfuscation proved its extreme usefulness by becoming the basis ...

متن کامل

Implementing Cryptographic Program Obfuscation

Program obfuscation is the process of making a program “unintelligible” without changing the program’s underlying input/output behavior. Although there is a long line of work on heuristic techniques for obfuscation, such approaches do not provide any cryptographic guarantee on their effectiveness. A recent result by Garg et al. (FOCS 2013), however, shows that cryptographic program obfuscation ...

متن کامل

Intransitive Non-Interference for Cryptographic Purposes

specification of what the system should do, possible implementations have to be proven to be at least as secure as this specification. The abstract specification usually consists of a monolithic idealized machine containing neither cryptographic details nor probabilism. Thus, its properties can typically be validated quite easily by formal proof systems, e.g., formal theorem proving or even aut...

متن کامل

Using Linear Congruential Generators for Cryptographic Purposes

We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG here after) in generating pseudo-random numbers for some cryptographic purpose. In particular, we choose email encryption as our cryptographic application. Our encryption will be considered secure if the attacker cannot infer the pseudo-random numbers without knowing the parameters of the LCG. We im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptology

سال: 2009

ISSN: 0933-2790,1432-1378

DOI: 10.1007/s00145-009-9046-1