Study on white-box cryptography: Key whitening and entropy attacks
暂无分享,去创建一个
[1] Himanshu Gupta,et al. ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION , 2011 .
[2] Yu-Lun Huang,et al. A control flow obfuscation method to discourage malicious tampering of software codes , 2006, ASIACCS '06.
[3] S. Som,et al. Session Key Based Manipulated Iteration Encryption Technique (SKBMIET) , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.
[4] Vinod Kumar Sharma,et al. Multiphase Encryption: A New Concept in Modern Cryptography , 2013 .
[5] Muhammad Shahid,et al. A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment , 2015 .
[6] Andrey Bogdanov,et al. White-Box Cryptography Revisited: Space-Hard Ciphers , 2015, CCS.
[7] J. K. Mandal,et al. Key based bit level genetic cryptographic technique (KBGCT) , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[8] Bart Preneel,et al. Cryptanalysis of a Perturbated White-Box AES Implementation , 2010, INDOCRYPT.
[9] Xuejia Lai,et al. A Secure Implementation of White-Box AES , 2009, 2009 2nd International Conference on Computer Science and its Applications.
[10] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[11] Wil Michiels. Opportunities in White-Box Cryptography , 2010, IEEE Security & Privacy.
[12] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[13] Wanlei Zhou,et al. Detection and defense of application-layer DDoS attacks in backbone web traffic , 2014, Future Gener. Comput. Syst..
[14] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[15] Bart Preneel,et al. Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings , 2007, IACR Cryptol. ePrint Arch..
[16] Subhranil Som,et al. Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function , 2013 .
[17] Xuemin Shen,et al. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding , 2009, Comput. Networks.
[18] Ajay Vikram Singh,et al. Mitigation of DoS attacks by using multiple encryptions in MANETs , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).
[19] HongTae Kim,et al. On Conditions to Satisfy White-Box Cryptography , 2014 .
[20] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[21] Bart Preneel,et al. Towards Security Notions for White-Box Cryptography , 2009, ISC.
[22] N. Venkatesu,et al. An Effective Defense Against Distributed Denial of Service in GRID , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[23] Sarvesh Tanwar,et al. Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation , 2013 .
[24] Wanlei Zhou,et al. Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[25] Abhinav Bhandari,et al. Destination Address Entropy based Detection and Traceback Approach against Distributed Denial of Service Attacks , 2015 .
[26] Shivi Goel. Cryptography and its Prominent Branches , 2013 .
[27] Brecht Wyseur,et al. White-Box Cryptography , 2011, Encyclopedia of Cryptography and Security.
[28] N. Venkatesu,et al. Notice of Violation of IEEE Publication PrinciplesAn Effective Defense against Distributed Denial of Service in Grid , 2008, 2010 First International Conference on Integrated Intelligent Computing.
[29] Alex Biryukov,et al. Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) , 2014, ASIACRYPT.
[30] Amitabh Saxena,et al. On White-box Cryptography and Obfuscation , 2008, ArXiv.
[31] Bart Preneel,et al. Two Attacks on a White-Box AES Implementation , 2013, Selected Areas in Cryptography.
[32] 홍원기,et al. A Flow-based Method for Abnormal Network Traffic Detection , 2004 .
[33] Li Yang. White Box Cryptography , 2022 .
[34] James A. Muir,et al. A Tutorial on White-box AES , 2013, IACR Cryptol. ePrint Arch..
[35] R.C. Joshi,et al. A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain , 2007, 2007 International Conference on Signal Processing, Communications and Networking.