Abstract. We describe a novel software verification primitive called Oblivious Hashing. Unlike previous techniques that mainly verify the static shape of code, this primitive allows implicit computation of a hash value based on the actual execution (i.e., space-time history of computation) of the code. We also discuss its applications in local software tamper resistance and remote code authentication. 1
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Often the core difficulty in designing zero-knowledge protocols arises from having to consider every...
Abstract—Information-theoretically secure string oblivious transfer (OT) can be constructed based on...
Abstract. We introduce software integrity checking expressions (Soft-ICEs), which are program predic...
Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
Abstract. Password Hashing, a technique commonly implemented by a server to protect passwords of cli...
In this paper, we propose several methods to increase the difficulty of reverse engineering applicat...
The encryption key is derived from the password in password-based encryption. Most implementations o...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
We present a lightweight authentication mechanism which verifies the authenticity of code and thereb...
Previously software is distributed to the users by using devices like CD.S and floppies and in the ...
Abstract. An important problem in secure multi-party computation is the design of protocols that can...
IT systems and data that you store, and process are valuable resources that need protection. Validat...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Often the core difficulty in designing zero-knowledge protocols arises from having to consider every...
Abstract—Information-theoretically secure string oblivious transfer (OT) can be constructed based on...
Abstract. We introduce software integrity checking expressions (Soft-ICEs), which are program predic...
Self-hashing has been proposed as a technique for verifying software integrity. Appealing aspects of...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
Abstract. Password Hashing, a technique commonly implemented by a server to protect passwords of cli...
In this paper, we propose several methods to increase the difficulty of reverse engineering applicat...
The encryption key is derived from the password in password-based encryption. Most implementations o...
Interactive Hashing has featured as an essential ingredient in protocols realizing a large variety o...
We present a lightweight authentication mechanism which verifies the authenticity of code and thereb...
Previously software is distributed to the users by using devices like CD.S and floppies and in the ...
Abstract. An important problem in secure multi-party computation is the design of protocols that can...
IT systems and data that you store, and process are valuable resources that need protection. Validat...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Within a forensic examination of a computer for illegal image content, robust hashing can be used to...
Often the core difficulty in designing zero-knowledge protocols arises from having to consider every...
Abstract—Information-theoretically secure string oblivious transfer (OT) can be constructed based on...