On the Impossibility of Obfuscation with Auxiliary Input
- 15 November 2005
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- On obfuscating point functionsPublished by Association for Computing Machinery (ACM) ,2005
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2004
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2001
- How to go beyond the black-box simulation barrierPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- A Pseudorandom Generator from any One-way FunctionSIAM Journal on Computing, 1999
- Definitions and properties of zero-knowledge proof systemsJournal of Cryptology, 1994
- A hard-core predicate for all one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Probabilistic encryptionJournal of Computer and System Sciences, 1984