1. Kenichiro AKAI, Tsutomu MATSUMOTO, “Brute force method of tamper resistance evaluation for block cipher software,” Computer Security Symposium 2000, CSS 2000, IPSJ Symposium series, Vol. 2000, No. 12, pp. 205–210, 2000. [in Japanese]
2. Lect Notes Comput Sci;D. Aucsmith,1996
3. Christian Collberg, Clark Thomborson, Douglas Low, “A Taxonomy of Obfuscating Transformations,” Technical Report 148, Department of Computer Science, The University of Auckland, 1997.
4. Ole-Johan Dahl, Edsger Dijkstra, C.A.R. Hoare, Structured Programming, A.P.I.C. Studies in Data Processing, No. 8, Academic Press, 1972.
5. Lect Notes Comput Sci;H. Goto,2000