Towards Efficient Software Protection Obeying Kerckhoffs's Principle using Tamper-proof Hardware
暂无分享,去创建一个
[1] Hoeteck Wee,et al. On obfuscating point functions , 2005, STOC '05.
[2] Eric Miles,et al. Secure Obfuscation in a Weak Multilinear Map Model , 2016, TCC.
[3] Mohamed Karroumi,et al. Protecting White-Box AES with Dual Ciphers , 2010, ICISC.
[4] Huijia Lin,et al. Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes , 2016, EUROCRYPT.
[5] Marc Joye,et al. On WhiteBox Cryptography , 2008 .
[6] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[7] Stefano Tessaro,et al. Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs , 2017, CRYPTO.
[8] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[9] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[10] Jonathan Katz,et al. Universally Composable Multi-party Computation Using Tamper-Proof Hardware , 2007, EUROCRYPT.
[11] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[12] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.