### Abstract

This paper describes a new obfuscarion method with two techniques by which both computational complexity can be controlled and semantic obfuscation can be achieved. The computational complexity can be strictly controlled by using the technique of encryption. The computational complexity can be arbitrarily specified by the impossibility of factorization of prime numbers by length from one second to about one year. Semantic obfuscation is achieved by transforming a function into a table function. A nonlinear, arbitrary function can be incorporated into the functions, while only linear functions are used in the conventional methods. Because the explicit function form is hidden, it is thought that analysis takes time. The computational complexity technique and semantic technique can be used at the same time, aucl the effect of integrated obfuscation with both techniques is great.

Original language | English |
---|---|

Title of host publication | Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010 |

Pages | 775-780 |

Number of pages | 6 |

Publication status | Published - 2010 Dec 1 |

Event | 2010 International Multiconference on Computer Science and Information Technology, IMCSIT 2010 - Wisla, Poland Duration: 2010 Oct 18 → 2010 Oct 20 |

### Publication series

Name | Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010 |
---|---|

Volume | 5 |

### Conference

Conference | 2010 International Multiconference on Computer Science and Information Technology, IMCSIT 2010 |
---|---|

Country | Poland |

City | Wisla |

Period | 10/10/18 → 10/10/20 |

### ASJC Scopus subject areas

- Computer Science (miscellaneous)
- Information Systems

## Fingerprint Dive into the research topics of 'Obfuscation methods with controlled calculation amounts and table tunction'. Together they form a unique fingerprint.

## Cite this

*Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010*(pp. 775-780). [5680052] (Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010; Vol. 5).