Skip to main navigation
Skip to search
Skip to main content
Tel Aviv University Home
Update Request & User Guide (TAU staff only)
Home
Experts
Research units
Research output
Datasets
Prizes
Activities
Press/Media
Search by expertise, name or affiliation
On strong simulation and composable point obfuscation
Nir Bitansky
,
Ran Canetti
School of Computer Science
Boston University
Research output
:
Contribution to journal
›
Article
›
peer-review
17
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'On strong simulation and composable point obfuscation'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Obfuscator
100%
Composable
100%
Strong Simulation
100%
Point Obfuscation
100%
Virtual Black-box
83%
Grey-box
50%
Obfuscation
33%
Oracle
33%
Adversary
16%
Knowledge-how
16%
Resilient
16%
Computable
16%
Work Study
16%
Computation Time
16%
Multi-bit
16%
Encryption
16%
Related-key Attack
16%
Public Key Setting
16%
Encryption Scheme
16%
Diffie-Hellman Assumption
16%
Digital Lockers
16%
Computational Diffie-Hellman Problem
16%
Key-dependent Message
16%
Key Leakage
16%
Computer Science
Obfuscation
100%
Computation Time
50%
Encryption Scheme
50%
public key
50%
Diffie-Hellman-Merkle key exchange
50%