Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes . The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures.
Read More
Software obfuscation is used in cryptography to transform source code to make it unintelligible without altering what it computes . The research described in this book, for which the author won the ACM Dissertation Award, establishes the feasibility of mathematically rigorous software obfuscation from well-studied hardness conjectures.
Read Less
Add this copy of Indistinguishability Obfuscation from Well-Studied to cart. $47.19, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2025 by Association for Computing Machinery.
Add this copy of Indistinguishability Obfuscation from Well-Studied to cart. $64.37, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2025 by Association for Computing Machinery.