Author:
Lynn Benjamin,Prabhakaran Manoj,Sahai Amit
Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. Lecture Notes in Computer Science;B. Barak,2001
2. Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing 1998 (1998)
3. Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation – tools for software protection. Technical Report TR00-03, The Department of Computer Science, University of Arizona (February 2000)
4. Lecture Notes in Computer Science;S. Chow,2003
5. Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Preliminary versions appeared at CRYPTO 1989 and STOC 1990. Journal of the ACM 43(3), 431–473 (1996)
Cited by
116 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献