Authors:
- Authors review the rapid development of candidate constructions
- Organizes the results of the first four years since the breakthrough of the first candidate indistinguishability obfuscator
- Useful reference for researchers in cryptography and theoretical computer science
- Includes supplementary material: sn.pub/extras
Part of the book series: SpringerBriefs in Computer Science (BRIEFSCOMPUTER)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (7 chapters)
-
Front Matter
-
Back Matter
About this book
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
Authors and Affiliations
-
Dept. of Networked Systems and Services, Budapest University of Technology and Economics (BME-HIT), Budapest, Hungary
Máté Horváth
-
Dept. of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, Hungary
Levente Buttyán
Bibliographic Information
Book Title: Cryptographic Obfuscation
Book Subtitle: A Survey
Authors: Máté Horváth, Levente Buttyán
Series Title: SpringerBriefs in Computer Science
DOI: https://doi.org/10.1007/978-3-319-98041-6
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Author(s), under exclusive licence to Springer Nature Switzerland AG 2020
Softcover ISBN: 978-3-319-98040-9Published: 06 October 2020
eBook ISBN: 978-3-319-98041-6Published: 05 October 2020
Series ISSN: 2191-5768
Series E-ISSN: 2191-5776
Edition Number: 1
Number of Pages: XXI, 107
Number of Illustrations: 1 b/w illustrations
Topics: Cryptology, Systems and Data Security