Implementing Oblivious Hashing Using Overlapped Instruction Encodings
A Graph Game Model for Software Tamper Protection