As a graduate student at the Massachusetts Institute of Technology in 1996, Amit Sahai was fascinated by the strange notion of a “zero-knowledge” proof, a type of mathematical protocol for convincing ...
Reverse engineering and tampering attacks threaten every mobile app, yet many apps apply basic code hardening techniques (or none at all!) to defend against these attempts. In fact, research has shown ...
COMMENTARY--I can imagine a world where the computers needed no security. Where there were no passwords, no security checks, and no firewalls. Where the computers communicated freely and shared ...
A cryptographic master tool called indistinguishability obfuscation has for years seemed too good to be true. Three researchers have figured out that it can work. A recent cryptographic breakthrough ...
There are plenty of tools out there that can decompile compiled assemblies and retrieve the original source code. These decompilers are a threat to your intellectual property, making it imperative ...
In 2018, Aayush Jain, a graduate student at the University of California, Los Angeles, traveled to Japan to give a talk about a powerful cryptographic tool he and his colleagues were developing. As he ...
Happy to bare - sorry - share all online? Surely one day we'll wish some things were private. Even as post-privacy activists or social media stars. Finn Brunton, co-author of "Obfuscate," on hiding ...
The word 'obfuscate' describes making information unclear or confusing, often intentionally. Originating from Latin for 'to darken,' it highlights how language can obscure truth rather than illuminate ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results