{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:07:45Z","timestamp":1725581265686},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/idt.2015.7396726","type":"proceedings-article","created":{"date-parts":[[2016,2,4]],"date-time":"2016-02-04T21:56:52Z","timestamp":1454623012000},"page":"5-8","source":"Crossref","is-referenced-by-count":0,"title":["Obfuscated arbitrary computation using cryptographic primitives"],"prefix":"10.1109","author":[{"given":"Nektarios Georgios","family":"Tsoutsos","sequence":"first","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_25"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/503053.503055"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1994.350027"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/355592.365646"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0237-1_8"},{"article-title":"Models of computation: Exploring the power of computing","year":"1997","author":"savage","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgebra.2003.09.034"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2419619"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_1"},{"article-title":"Homomorphic encryption breakthrough","year":"2009","author":"schneier","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2011.5936608"},{"key":"ref6","first-page":"1","article-title":"HEROIC: Homomorphically EncRypted One Instruction Computer","author":"tsoutsos","year":"2014","journal-title":"Design Automation and Test in Europe Conference and Exhibition (DATE)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/2090236.2090262","article-title":"(Leveled) fully homomorphic encryption without bootstrappiog","author":"brakerski","year":"2012","journal-title":"Innovations in Theoretical Computer Science Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660374"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660285"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666445"},{"key":"ref20","article-title":"A taxonomy of obfuscating transformations","author":"collberg","year":"1997","journal-title":"Tech Rep"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287186"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060669"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596668"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.007"},{"key":"ref25","article-title":"A simple multi-processor computer based on subleq","author":"mazonka","year":"2011","journal-title":"arXiv preprint arXiv 1106 2593"}],"event":{"name":"2015 10th International Design & Test Symposium (IDT)","start":{"date-parts":[[2015,12,14]]},"location":"Dead Sea, Amman, Jordan","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 10th International Design &amp; Test Symposium (IDT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7383418\/7396715\/07396726.pdf?arnumber=7396726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,3]],"date-time":"2022-06-03T10:14:36Z","timestamp":1654251276000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7396726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/idt.2015.7396726","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}