Post-Zeroizing Obfuscation: The case of Evasive Circuits (original) (raw)

Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits

Eric Miles

Advances in Cryptology – EUROCRYPT 2016, 2016

View PDFchevron_right

Secure Obfuscation in a Weak Multilinear Map Model

Eric Miles

Theory of Cryptography, 2016

View PDFchevron_right

Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification

Aayush Jain

Advances in Cryptology – CRYPTO 2019, 2019

View PDFchevron_right

Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness

Aayush Jain

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

Protecting obfuscation against arithmetic attacks

Eric Miles

View PDFchevron_right

Obfuscation from Low Noise Multilinear Maps

Divya Kant Gupta 21BEI0028

Progress in Cryptology – INDOCRYPT 2018, 2018

View PDFchevron_right

Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13

Eric Miles

Advances in Cryptology – CRYPTO 2016, 2016

View PDFchevron_right

On the (im)possibility of obfuscating programs

Steven Rudich

Journal of the ACM, 2012

View PDFchevron_right

Optimizing Obfuscation

Divya Kant Gupta 21BEI0028

Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

View PDFchevron_right

Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation

Chengyu Lin

2018

View PDFchevron_right

Obfuscation using Tensor Products

Charanjit Jutla

Electron. Colloquium Comput. Complex., 2018

View PDFchevron_right

Non-malleable Obfuscation

Ran Canetti

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification

Aayush Jain

Lecture Notes in Computer Science, 2021

View PDFchevron_right

Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption

Aayush Jain

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

Amit Sahai

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations

Eric Miles

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Computation-Trace Indistinguishability Obfuscation and its Applications

Wei-Kai Lin

IACR Cryptol. ePrint Arch., 2015

View PDFchevron_right

Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits

Pratik Sarkar

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption

Aayush Jain

2020

View PDFchevron_right

List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument

Adam Smith

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Scalable Attack-Resistant Obfuscation of Logic Circuits

Abdulrahman Alaql

2020

View PDFchevron_right

Practical implementations of program obfuscators for point functions

Giovanni Di Crescenzo

2016 International Conference on High Performance Computing & Simulation (HPCS), 2016

View PDFchevron_right

Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP

Amit Sahai

Theory of Cryptography, 2015

View PDFchevron_right

Obfuscation Combiners

Amir Herzberg

Lecture Notes in Computer Science, 2016

View PDFchevron_right

On White-box Cryptography and Obfuscation

Amitabh Saxena

View PDFchevron_right

Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction

Kishan Gupta

IEEE Transactions on Information Theory, 2006

View PDFchevron_right

Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption

Aayush Jain

Lecture Notes in Computer Science, 2016

View PDFchevron_right

Multi-input Functional Encryption

Amit Sahai

Advances in Cryptology – EUROCRYPT 2014, 2014

View PDFchevron_right

Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation

Mohsin Hanif

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

On the Security of the “Free-XOR” Technique

Ranjit Kumaresan, Hong-Sheng Zhou

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Algebraic Attacks and Decomposition of Boolean Functions

Enes Pasalic

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Implementing Conjunction Obfuscation Under Entropic Ring LWE

Giovanni Di Crescenzo

2018 IEEE Symposium on Security and Privacy (SP), 2018

View PDFchevron_right

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs

Alec Yasinsac

The Second International Conference on Availability, Reliability and Security (ARES'07), 2007

View PDFchevron_right