Cryptography April 3 , 2007 Lecture 18 : Program

نویسندگان

  • Susan Hohenberger
  • Zachary Scott
چکیده

The goal of program obfuscation is to provably complicate the task of reverse engineering. Owners of source code wish to make it as hard as possible for others to extract information from their binaries information which may reveal trade secrets, allow undesirable modifications, or enable software piracy. Obfuscation is typically seen as a problem relating to programming languages or compilers. The connection to cryptography is not entirely clear and was only first noticed in 2000. Since then, a few papers have been published every year on the subject. Programs are generally viewed as black boxes:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers

Why should wait for some days to get or receive the security protocols xvi 16th international workshop cambridge uk april 16 18 2008 revised selected papers lecture notes in computer science book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This secu...

متن کامل

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures

Somewhat surprisingly, Shamir was able to construct a very efficient such scheme for any n and t without relying on any cryptographic assumptions (that is, obtaining informationtheoretic Shannon-like security). Such schemes are called t-out-of-n secret sharing schemes. An n-out-of-n schemes is a scheme where all n shares are needed to reconstruct, and if even one share is missing then there’s a...

متن کامل

Heritage of Antoni Kępiński

Jacek Bomba: Department of Child and Adolescent Psychiatry; Chair of Psychiatry; The Jagiellonian University Collegium Medicum, Kraków, Poland; Correspondence address: Jacek Bomba, Department of Child and Adolescent Psychiatry, Chair of Psychiatry, The Jagiellonian University Collegium Medicum, Kraków, Poland, 21a Kopernika St., 31–501 Kraków, Poland, e-mail: [email protected]; Based on a l...

متن کامل

Optimization methods in portfolio management and option hedging

These lecture notes give an introduction to modern, continuous-time portfolio management and option hedging. We present the stochastic control method to portfolio optimization, which covers Merton’s pioneering work. The alternative martingale approach is also exposed with a nice application on option hedging with value at risk criterion. ∗Lectures for the CIMPA-IMAMIS school on mathematical fin...

متن کامل

Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings

security protocols 11th international workshop cambridge uk april 2-4 2003 revised selected papers lecture notes in computer science security and cryptology PDF

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007