Back to Results
First PageMeta Content
Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code


Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,
Add to Reading List

Document Date: 2007-03-08 09:17:59


Open Document

File Size: 274,76 KB

Share Result on Facebook

City

Lausanne / Amsterdam / /

/

Facility

University of Bristol / /

IndustryTerm

generation algorithm / probabilistic polynomial time algorithm / private key encryption algorithm / obfuscation algorithm / public-key systems / probabilistic algorithm / cryptographic applications / brute-force search / transformation algorithm / proof systems / polynomial time encryption algorithm / meaningful applications / encryption algorithm / obfuscatable encryption algorithm / polynomial time decryption algorithm / /

Organization

University of Bristol / /

/

Position

FTG-CPA / IND-CPA / CPA / /

Technology

encryption / polynomial time decryption algorithm / transforming secretkey encryption / cryptography / secret-key encryption / following three algorithms / PPT algorithm / key generation algorithm / public key / public-key encryption / encryption algorithm / private key encryption algorithm / 4.1 Transforming Secret-Key Encryption / same three algorithms / private key / key transformation algorithm / secret key / simulation / digital signature / probabilistic polynomial time algorithm / obfuscatable encryption algorithm / polynomial time encryption algorithm / obfuscation algorithm / probabilistic algorithm / two algorithms / PPT key generation algorithm / /

SocialTag