Cryptographic obfuscation : a survey /
Saved in:
Author / Creator: | Horváth, Máté, author. |
---|---|
Imprint: | Cham, Switzerland : Springer, [2020] |
Description: | 1 online resource (xxi, 107 pages). |
Language: | English |
Series: | SpringerBriefs in Computer Science, 2191-5768 SpringerBriefs in computer science, |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/12608613 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 12608613 | ||
006 | m d | ||
007 | cr nn||||mamaa | ||
008 | 201005s2020 sz ob 000 0 eng d | ||
005 | 20240521135709.2 | ||
019 | |a 1199125502 |a 1202462826 |a 1202469052 |a 1206400432 |a 1206403259 |a 1223090376 |a 1223098103 |a 1224364833 |a 1224368983 |a 1225354528 | ||
020 | |a 9783319980416 |q electronic book | ||
020 | |a 3319980416 |q electronic book | ||
020 | |z 3319980408 | ||
020 | |z 9783319980409 | ||
024 | 7 | |a 10.1007/978-3-319-98041-6 |2 doi | |
035 | |a (OCoLC)1203979924 |z (OCoLC)1199125502 |z (OCoLC)1202462826 |z (OCoLC)1202469052 |z (OCoLC)1206400432 |z (OCoLC)1206403259 |z (OCoLC)1223090376 |z (OCoLC)1223098103 |z (OCoLC)1224364833 |z (OCoLC)1224368983 |z (OCoLC)1225354528 | ||
035 | 9 | |a (OCLCCM-CC)1203979924 | |
037 | |b Springer | ||
040 | |a DCT |b eng |e rda |c DCT |d SFB |d EBLCP |d OCLCO |d YDX |d UKAHL |d OCLCF |d YDXIT |d GW5XE | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.D335 |b H67 2020 | |
100 | 1 | |a Horváth, Máté, |e author. | |
245 | 1 | 0 | |a Cryptographic obfuscation : |b a survey / |c Máté Horváth, Levente Buttyán. |
264 | 1 | |a Cham, Switzerland : |b Springer, |c [2020] | |
300 | |a 1 online resource (xxi, 107 pages). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a SpringerBriefs in Computer Science, |x 2191-5768 | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Introduction -- Background -- Definitional Approaches -- Bootstrapping: From the Seed to the Flower -- Building Core-Obfuscators: In Search of a Seed -- Building Functional Encryption: In Search of a Seed -- iO Combiners and Universal Constructions. | |
520 | |a This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science. | ||
588 | |a Description based on online resource; title from digital title page (viewed on December 11, 2020). | ||
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
655 | 0 | |a Electronic books. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Buttyán, Levente, |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut |0 http://id.loc.gov/authorities/names/nb2007001526 | |
776 | 0 | 8 | |i Printed edition: |z 9783319980409 |
776 | 0 | 8 | |i Printed edition: |z 9783319980423 |
830 | 0 | |a SpringerBriefs in computer science, |x 2191-5768 |0 http://id.loc.gov/authorities/names/no2011109396 | |
903 | |a HeVa | ||
929 | |a oclccm | ||
999 | f | f | |i 849e4a87-50ca-54ff-85cf-22c455c82a6c |s 917837ca-81c5-5e33-9865-bd6400d66110 |
928 | |t Library of Congress classification |a QA76.9.D335 H67 2020 |l Online |c UC-FullText |u https://link.springer.com/10.1007/978-3-319-98041-6 |z Springer Nature |g ebooks |i 12624221 |