Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives.
Sanjam GargMohammad MahmoodyAmeer MohammedPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- lower bound
- upper bound
- branch and bound algorithm
- reverse engineering
- np hard
- optimal solution
- branch and bound
- objective function
- low level
- worst case
- lower bounding
- encryption scheme
- lower and upper bounds
- key management
- image encryption
- static analysis
- building blocks
- encryption algorithms
- high level
- control flow
- encryption algorithm
- data encryption
- secret key
- key exchange
- digital signature
- security properties
- quadratic assignment problem
- encryption decryption
- security analysis
- upper and lower bounds
- set of randomly generated instances
- operating system
- data transformation
- ciphertext
- linear programming relaxation