Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures.
Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures.

Indistinguishability Obfuscation from Well-Studied Assumptions
134
Indistinguishability Obfuscation from Well-Studied Assumptions
134Product Details
ISBN-13: | 9798400713651 |
---|---|
Publisher: | Association for Computing Machinery |
Publication date: | 04/08/2025 |
Series: | ACM Books |
Pages: | 134 |
Product dimensions: | 7.50(w) x 9.25(h) x 0.38(d) |