Overview
- Authors review the rapid development of candidate constructions
- Organizes the results of the first four years since the breakthrough of the first candidate indistinguishability obfuscator
- Useful reference for researchers in cryptography and theoretical computer science
- Includes supplementary material: sn.pub/extras
Part of the book series: SpringerBriefs in Computer Science (BRIEFSCOMPUTER)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
Similar content being viewed by others
Keywords
Table of contents (7 chapters)
Authors and Affiliations
Bibliographic Information
Book Title: Cryptographic Obfuscation
Book Subtitle: A Survey
Authors: Máté Horváth, Levente Buttyán
Series Title: SpringerBriefs in Computer Science
DOI: https://doi.org/10.1007/978-3-319-98041-6
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Author(s), under exclusive licence to Springer Nature Switzerland AG 2020
Softcover ISBN: 978-3-319-98040-9Published: 06 October 2020
eBook ISBN: 978-3-319-98041-6Published: 05 October 2020
Series ISSN: 2191-5768
Series E-ISSN: 2191-5776
Edition Number: 1
Number of Pages: XXI, 107
Number of Illustrations: 1 b/w illustrations
Topics: Cryptology, Systems and Data Security