共 50 条
- [1] Use of cryptography in malware obfuscation [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
- [3] On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 241 - 250
- [4] Cryptography for Parallel RAM from Indistinguishability Obfuscation [J]. ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, : 179 - 190
- [5] Incremental Program Obfuscation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 193 - 223
- [6] Hardware Obfuscation using Strong PUFs [J]. 2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 321 - 326
- [7] On Strong Simulation and Composable Point Obfuscation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 520 - 537
- [8] On Strong Simulation and Composable Point Obfuscation [J]. JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 317 - 357
- [9] Methods and Software for the Program Obfuscation [J]. SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115
- [10] On Strong Simulation and Composable Point Obfuscation [J]. Journal of Cryptology, 2014, 27 : 317 - 357