[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Witness encryption and null-IO from evasive LWE

V Vaikuntanathan, H Wee, D Wichs - … on the Theory and Application of …, 2022 - Springer
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …

Optimal broadcast encryption and CP-ABE from evasive lattice assumptions

H Wee - Annual International Conference on the Theory and …, 2022 - Springer
We present a new, simple candidate broadcast encryption scheme for N users with
parameter size poly (log N). We prove security of our scheme under a non-standard variant …

Faster Gaussian sampling for trapdoor lattices with arbitrary modulus

N Genise, D Micciancio - … in Cryptology–EUROCRYPT 2018: 37th Annual …, 2018 - Springer
We present improved algorithms for gaussian preimage sampling using the lattice trapdoors
of (Micciancio and Peikert, CRYPTO 2012). The MP12 work only offered a highly optimized …

GGH15 beyond permutation branching programs: proofs, attacks, and candidates

Y Chen, V Vaikuntanathan, H Wee - … , Santa Barbara, CA, USA, August 19 …, 2018 - Springer
We carry out a systematic study of the GGH15 graded encoding scheme used with general
branching programs. This is motivated by the fact that general branching programs are more …

Approximate trapdoors for lattices and smaller hash-and-sign signatures

Y Chen, N Genise, P Mukherjee - … on the Theory and Application of …, 2019 - Springer
We study a relaxed notion of lattice trapdoor called approximate trapdoor, which is defined
to be able to invert Ajtai's one-way function approximately instead of exactly. The primary …

Lattice-based SNARGs and their application to more efficient obfuscation

D Boneh, Y Ishai, A Sahai, DJ Wu - … on the Theory and Applications of …, 2017 - Springer
Succinct non-interactive arguments (SNARGs) enable verifying NP computations with
substantially lower complexity than that required for classical NP verification. In this work, we …

Building an efficient lattice gadget toolkit: Subgaussian sampling and more

N Genise, D Micciancio, Y Polyakov - … on the Theory and Applications of …, 2019 - Springer
Many advanced lattice cryptography applications require efficient algorithms for inverting the
so-called “gadget” matrices, which are used to formally describe a digit decomposition …

Use of cryptography in malware obfuscation

HJ Asghar, BZH Zhao, M Ikram, G Nguyen… - Journal of Computer …, 2024 - Springer
Malware authors often use cryptographic tools such as XOR encryption and block ciphers
like AES to obfuscate part of the malware to evade detection. Use of cryptography may give …

Large FHE gates from tensored homomorphic accumulator

G Bonnoron, L Ducas, M Fillinger - … in Africa, Marrakesh, Morocco, May 7 …, 2018 - Springer
The main bottleneck of all known Fully Homomorphic Encryption schemes lies in the
bootstrapping procedure invented by Gentry (STOC'09). The cost of this procedure can be …