Stem indistinguish$ (all stems)
9 papers:
- STOC-2015-CanettiH0V #obfuscation #ram #source code
- Succinct Garbling and Indistinguishability Obfuscation for RAM Programs (RC, JH, AJ, VV), pp. 429–437.
- STOC-2015-KoppulaLW #bound #memory management #obfuscation #turing machine
- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory (VK, ABL, BW), pp. 419–428.
- STOC-2014-SahaiW #encryption #how #obfuscation
- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
- ICALP-v1-2014-OstrovskyPV #on the #proving
- On Input Indistinguishable Proof Systems (RO, GP, IV), pp. 895–906.
- SAC-2012-CuellarOR #privacy
- Indistinguishable regions in geographic privacy (JC, MO, RR), pp. 1463–1469.
- SAC-2011-Blech #encryption #logic #proving #security
- Proving the security of ElGamal encryption via indistinguishability logic (JOB), pp. 1625–1632.
- TLCA-2009-Zhang #logic #reasoning
- The Computational SLR: A Logic for Reasoning about Computational Indistinguishability (YZ), pp. 401–415.
- ICALP-2000-AielloBOR #performance #proving #verification
- Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP (WA, SNB, RO, SR), pp. 463–474.
- STOC-1990-FeigeS #protocol
- Witness Indistinguishable and Witness Hiding Protocols (UF, AS), pp. 416–426.