Back to Results
First PageMeta Content
Complexity classes / Obfuscation / Circuit complexity / Obfuscated code / Ciphertext indistinguishability / International Obfuscated C Code Contest / NC / Semantic security / Multilinear map / Theoretical computer science / Computer programming / Computational complexity theory


Survey on Cryptographic Obfuscation M´at´e Horv´ath∗ Laboratory of Cryptography and System Security (CrySyS Lab)† April 24, 2015
Add to Reading List

Document Date: 2015-04-24 07:02:48


Open Document

File Size: 857,92 KB

Share Result on Facebook

City

Budapest / /

Company

CNF / GT / Gd / GbindT / /

/

Facility

Laboratory of Cryptography / University of Technology / /

Holiday

Assumption / /

IndustryTerm

software protection / potential applications / web-based services / software implementations / decryption algorithm / data mining / secure hardware / sub-exponential time algorithm / computing / smart devices / cloud computing / software patch / Secure software / mentioned applications / /

Organization

US Federal Reserve / Laboratory of Cryptography and System Security / CrySyS Lab / University of Technology and Economics / /

Person

Kalai / Computation / Ai / Uriel Feige / /

Position

CPA / General / /

Product

SDI iP99 Radio / /

ProgrammingLanguage

C / /

Technology

encryption / Cryptography / An algorithm / witness encryption / 2 encryption / sub-exponential time algorithm / data mining / simulation / decryption algorithm / /

SocialTag