White-Box Cryptography and an AES Implementation
暂无分享,去创建一个
Paul C. van Oorschot | Stanley Chow | Philip A. Eisen | Harold Johnson | P. V. Oorschot | S. Chow | H. Johnson
[1] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[2] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[3] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[4] Joan Daemen,et al. Bitslice Ciphers and Power Analysis Attacks , 2000, FSE.
[5] B CohenFrederick. Operating system protection through program evolution , 1993 .
[6] Paul C. van Oorschot,et al. A White-Box DES Implementation for DRM Applications , 2002, Digital Rights Management Workshop.
[7] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] Jan Camenisch,et al. Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[10] John C. Knight,et al. A security architecture for survivability mechanisms , 2001 .
[11] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[12] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[13] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[14] Yuan Xiang Gu,et al. An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs , 2001, ISC.
[15] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[16] Markus Jakobsson,et al. Discouraging Software Piracy Using Software Aging , 2001, Digital Rights Management Workshop.
[17] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[18] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[19] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[20] Pierre L'Ecuyer,et al. Efficient and portable combined random number generators , 1988, CACM.
[21] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[22] James Xiao,et al. Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank , 2002, IACR Cryptol. ePrint Arch..