On the (Im)possibility of Obfuscating Programs
Top Cited Papers
- 2 August 2001
- book chapter
- Published by Springer Nature
- Vol. 8 (057) , 1-18
- https://doi.org/10.1007/3-540-44647-8_1
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Zero-Knowledge and Code ObfuscationPublished by Springer Nature ,2000
- Complete characterization of security notions for probabilistic private-key encryptionPublished by Association for Computing Machinery (ACM) ,2000
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- How to Copyright a Function?Published by Springer Nature ,1999
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- Algorithms for Black-Box Fields and their Application to CryptographyPublished by Springer Nature ,1996
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Distributed Computing and CryptographyPublished by American Mathematical Society (AMS) ,1991
- How to construct random functionsJournal of the ACM, 1986
- Probabilistic encryptionJournal of Computer and System Sciences, 1984