A White-Box DES Implementation for DRM Applications
暂无分享,去创建一个
Paul C. van Oorschot | Stanley Chow | Philip A. Eisen | Harold Johnson | P. V. Oorschot | S. Chow | H. Johnson
[1] L. Dickson. Linear Groups, with an Exposition of the Galois Field Theory , 1958 .
[2] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[3] Joe Kilian,et al. How to Protect DES Against Exhaustive Key Search , 1996, CRYPTO.
[4] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[5] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[6] Markus Jakobsson,et al. Discouraging Software Piracy Using Software Aging , 2001, Digital Rights Management Workshop.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[9] Dan Boneh,et al. Attacking an Obfuscated Cipher by Injecting Faults , 2002, Digital Rights Management Workshop.
[10] Paul C. van Oorschot,et al. White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.