Author:
Brakerski Zvika,Rothblum Guy N.
Publisher
Springer Berlin Heidelberg
Reference40 articles.
1. Lecture Notes in Computer Science;B. Adida,2007
2. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in nc0. SIAM J. Comput. 36(4), 845–888 (2006)
3. Babai, L.: Trading group theory for randomness. In: STOC, pp. 421–429 (1985)
4. Barak, B., Garg, S., Kalai, Y.T., Paneth, O., Sahai, A.: Protecting obfuscation against algebraic attacks. Cryptology ePrint Archive, Report 2013/631 (2013),
http://eprint.iacr.org/
5. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. J. ACM 59(2), 6 (2012)
Cited by
161 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献