An Obfuscated Implementation of RC4
暂无分享,去创建一个
[1] Hallie McClung Workman. Formation of safe spaces in gendered online communities [electronic resource] : reddit and "the front page of the internet" / , 2014 .
[2] Paul C. van Oorschot,et al. White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.
[3] Atsuko Miyaji,et al. Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.
[4] Jack W. Davidson,et al. Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .
[5] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[6] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.
[7] Paul C. van Oorschot,et al. A White-Box DES Implementation for DRM Applications , 2002, Digital Rights Management Workshop.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Jules Desharnais,et al. Static Detection of Malicious Code in Executable Programs , 2000 .
[10] Hamilton E. Link,et al. Clarifying Obfuscation: Improving the Security of White-Box Encoding , 2004, IACR Cryptol. ePrint Arch..
[11] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[12] Fei-Yue Wang,et al. Obfuscate arrays by homomorphic functions , 2006, 2006 IEEE International Conference on Granular Computing.
[13] Hamilton E. Link,et al. Clarifying obfuscation: improving the security of white-box DES , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[14] P. Biondi,et al. Silver Needle in the Skype , 2006 .
[15] Okyeon Yi,et al. Methods for practical whitebox cryptography , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).
[16] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .