Cited By
View all- Cohen AHolmgren JNishimaki RVaikuntanathan VWichs DWichs DMansour Y(2016)Watermarking cryptographic capabilitiesProceedings of the forty-eighth annual ACM symposium on Theory of Computing10.1145/2897518.2897651(1115-1127)Online publication date: 19-Jun-2016
- Kiayias ATang QSadeghi AGligor VYung M(2013)How to keep a secretProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516691(943-954)Online publication date: 4-Nov-2013
- Barak BGoldreich OImpagliazzo RRudich SSahai AVadhan SYang K(2012)On the (im)possibility of obfuscating programsJournal of the ACM (JACM)10.1145/2160158.216015959:2(1-48)Online publication date: 3-May-2012
- Show More Cited By