1. Chow, S., Eisen, P., Johnson, H., and van Oorschot, P.C. (2002, January 15–16). White-Box Cryptography and an AES Implementation. Proceedings of the ACM Symposium on Applied Computing, St. John’s, NF, Canada.
2. Billet, O., Gilbert, H., and Ech-Chatbi, C. (2004, January 9–10). Cryptanalysis of a White Box AES Implementation. Proceedings of the ACM Symposium on Applied Computing, Waterloo, ON, Canada.
3. Bos, J.W., Hubain, C., Michiels, W., and Teuwen, P. (2019, January 17–19). Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, Santa Barbara, CA, USA.
4. A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis;Lee;IEEE Trans. Inf. Forensics Secur.,2018
5. Improvement on a Masked White-Box Cryptographic Implementation;Lee;IEEE Access,2020