![]() |
|
Indistinguishability Obfuscation from Well-Studied Assumptions (ACM Books) - Nyomtatható verzió +- HHW.hu (https://hhwforum.hu) +-- Fórum: Letöltések (https://hhwforum.hu/forumdisplay.php?fid=9) +--- Fórum: E-könyvek (https://hhwforum.hu/forumdisplay.php?fid=57) +---- Fórum: Külföldi könyvek (https://hhwforum.hu/forumdisplay.php?fid=64) +---- Téma: Indistinguishability Obfuscation from Well-Studied Assumptions (ACM Books) (/showthread.php?tid=426047) |
RE: Indistinguishability Obfuscation from Well-Studied Assumptions (ACM Books) - book24h - 2026-01-25 ![]() Free Download Indistinguishability Obfuscation from Well-Studied Assumptions (ACM Books) by Aayush Jain English | April 3, 2025 | ISBN: 8400713664 | 134 pages | PDF | 5.62 Mb Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes. As a software security mechanism, it is essential that software obfuscation have a firm mathematical foundation. The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures. The mathematical object that the author constructs, indistinguishability obfuscation, is considered a theoretical "master tool" in the context of cryptography: not only in helping to achieve long-desired cryptographic goals such as functional encryption, but also in expanding the scope of the field of cryptography itself. For example, indistinguishability obfuscation aids in goals related to software security that were previously entirely in the domain of software engineering. Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me Idézet:A kódrészlet megtekintéséhez be kell jelentkezned, vagy nincs jogosultságod a tartalom megtekintéséhez.Links are Interchangeable - Single Extraction |