### Abstract

This paper describes a new obfuscarion method with two techniques by which both computational complexity can be controlled and semantic obfuscation can be achieved. The computational complexity can be strictly controlled by using the technique of encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime numbers by length from one second to about one year. Semantic obfuscation is achieved by transforming a function into a table function. A nonlinear, arbitrary function can be incorporated into the functions, while only linear functions are used in the conventional methods. Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, aucl the effect of integrated obfuscation with both techniques is great.

Original language | English |
---|---|

Title of host publication | Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010 |

Pages | 775-780 |

Number of pages | 6 |

Volume | 5 |

Publication status | Published - 2010 |

Externally published | Yes |

Event | 2010 International Multiconference on Computer Science and Information Technology, IMCSIT 2010 - Wisla Duration: 2010 Oct 18 → 2010 Oct 20 |

### Other

Other | 2010 International Multiconference on Computer Science and Information Technology, IMCSIT 2010 |
---|---|

City | Wisla |

Period | 10/10/18 → 10/10/20 |

### Fingerprint

### ASJC Scopus subject areas

- Computer Science (miscellaneous)
- Information Systems

### Cite this

*Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010*(Vol. 5, pp. 775-780). [5680052]

**Obfuscation methods with controlled calculation amounts and table tunction.** / Wei, Yuan Yu; Ohzeki, Kazuo.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

*Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010.*vol. 5, 5680052, pp. 775-780, 2010 International Multiconference on Computer Science and Information Technology, IMCSIT 2010, Wisla, 10/10/18.

}

TY - GEN

T1 - Obfuscation methods with controlled calculation amounts and table tunction

AU - Wei, Yuan Yu

AU - Ohzeki, Kazuo

PY - 2010

Y1 - 2010

N2 - This paper describes a new obfuscarion method with two techniques by which both computational complexity can be controlled and semantic obfuscation can be achieved. The computational complexity can be strictly controlled by using the technique of encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime numbers by length from one second to about one year. Semantic obfuscation is achieved by transforming a function into a table function. A nonlinear, arbitrary function can be incorporated into the functions, while only linear functions are used in the conventional methods. Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, aucl the effect of integrated obfuscation with both techniques is great.

AB - This paper describes a new obfuscarion method with two techniques by which both computational complexity can be controlled and semantic obfuscation can be achieved. The computational complexity can be strictly controlled by using the technique of encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime numbers by length from one second to about one year. Semantic obfuscation is achieved by transforming a function into a table function. A nonlinear, arbitrary function can be incorporated into the functions, while only linear functions are used in the conventional methods. Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, aucl the effect of integrated obfuscation with both techniques is great.

UR - http://www.scopus.com/inward/record.url?scp=79551521527&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79551521527&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9788360810279

VL - 5

SP - 775

EP - 780

BT - Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010

ER -