Coordinatore |
Organization address
address: RAMAT AVIV contact info |
Nazionalità Coordinatore | Non specificata |
Totale costo | 100˙000 € |
EC contributo | 100˙000 € |
Programma | FP7-PEOPLE
Specific programme "People" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013) |
Code Call | FP7-PEOPLE-IRG-2008 |
Funding Scheme | MC-IRG |
Anno di inizio | 2008 |
Periodo (anno-mese-giorno) | 2008-09-01 - 2012-08-31 |
# | ||||
---|---|---|---|---|
1 |
TEL AVIV UNIVERSITY
Organization address
address: RAMAT AVIV contact info |
IL (TEL AVIV) | coordinator | 0.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
'Program Obfuscators are algorithms that take as input a program P and output another program that has the same input-output functionality, and at the same time is 'hard to understand'. Ideally, seeing the obfuscated program in full should not give any insight or ability other than the ability to simply run it 'as a black box' on inputs of one's choice. Program obfuscation is a hard task. Indeed, practical experience shows that most, if not all ah-hoc attempts at obfuscating programs eventually fail. Furthermore, theoretical results rule out the existence of algorithms that can obfuscate any program in the above ideal sense. Still, recent results demonstrate that provably secure obfuscators do exist for some simple classes of programs. The proposed research aims to further our understanding of this intriguing concept and its usefulness in cryptography. Some of the proposed directions are: - Expanding the boundaries of what's provably obfuscatable. As first steps, we propose new methodologies for obfuscating richer classes of programs, along with some exciting applications. - Formulating and achieving stronger notions of obfuscation than the currently considered ones. The currently considered notions of obfuscation do not suffice for some prominent applications. The unaddressed concerns include malleability of obfuscated programs, composability, and security for low-entropy inputs. - Finding ways to circumvent the known impossibility results for general-purpose obfuscators. Two directions look promising here: One is to relax the current formulations in a way that preserves the essence of the notion. Alternatively, analyze obfuscators in an abstract models that represent limited adversaries. - Finding new applications of the program obfuscation in other areas in cryptography.'
Bringing the field of psychiatry forward: Unraveling heterogeneity of Depression
Read More"Physiological characterization of PK2 in the control of fertility, and its interaction with kisspeptins"
Read MoreNovel isotopic constraints on the environmental impact of continental flood basalt eruptions
Read More