Post-Zeroizing Obfuscation: The case of Evasive Circuits (original) (raw)
Related papers
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
Advances in Cryptology – EUROCRYPT 2016, 2016
Secure Obfuscation in a Weak Multilinear Map Model
Theory of Cryptography, 2016
Advances in Cryptology – CRYPTO 2019, 2019
IACR Cryptol. ePrint Arch., 2018
Protecting obfuscation against arithmetic attacks
Obfuscation from Low Noise Multilinear Maps
Progress in Cryptology – INDOCRYPT 2018, 2018
Advances in Cryptology – CRYPTO 2016, 2016
On the (im)possibility of obfuscating programs
Journal of the ACM, 2012
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
2018
Obfuscation using Tensor Products
Electron. Colloquium Comput. Complex., 2018
Lecture Notes in Computer Science, 2009
Lecture Notes in Computer Science, 2021
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
Lecture Notes in Computer Science, 2017
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
Lecture Notes in Computer Science, 2017
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Lecture Notes in Computer Science, 2015
Computation-Trace Indistinguishability Obfuscation and its Applications
IACR Cryptol. ePrint Arch., 2015
Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits
IACR Cryptol. ePrint Arch., 2018
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
2020
List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument
Lecture Notes in Computer Science, 2004
Scalable Attack-Resistant Obfuscation of Logic Circuits
2020
Practical implementations of program obfuscators for point functions
2016 International Conference on High Performance Computing & Simulation (HPCS), 2016
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
Theory of Cryptography, 2015
Lecture Notes in Computer Science, 2016
On White-box Cryptography and Obfuscation
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction
IEEE Transactions on Information Theory, 2006
Lecture Notes in Computer Science, 2016
Multi-input Functional Encryption
Advances in Cryptology – EUROCRYPT 2014, 2014
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
IACR Cryptol. ePrint Arch., 2018
On the Security of the “Free-XOR” Technique
Ranjit Kumaresan, Hong-Sheng Zhou
Lecture Notes in Computer Science, 2012
Algebraic Attacks and Decomposition of Boolean Functions
Lecture Notes in Computer Science, 2004
Implementing Conjunction Obfuscation Under Entropic Ring LWE
2018 IEEE Symposium on Security and Privacy (SP), 2018
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs
The Second International Conference on Availability, Reliability and Security (ARES'07), 2007