Author:
Dachman-Soled Dana,Liu Feng-Hao,Zhou Hong-Sheng
Publisher
Springer Berlin Heidelberg
Reference51 articles.
1. Lecture Notes in Computer Science;D Agrawal,2003
2. Ananth, P., Gupta, D., Ishai, Y., Sahai, A.: Optimizing obfuscation: Avoiding barrington’s theorem. Cryptology ePrint Archive, Report 2014/222 (2014).
http://eprint.iacr.org/2014/222
3. Lecture Notes in Computer Science;B Barak,2014
4. Lecture Notes in Computer Science;B Barak,2001
5. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. Journal of the ACM 59(2), 6 (2012)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献