Publisher
Oxford University Press (OUP)
Reference26 articles.
1. Chow S. , Eisen P. , Johnson H. and Van Oorschot P.C. (2003) White-Box Cryptography and an AES Implementation. Proc. SAC 2002, St. Johns, Newfoundland, August 15–16, pp. 250–270. Springer, Berlin.
2. Chow S. , Eisen P. , Johnson H. and Van Oorschot P.C. (2003) A White-Box DES Implementation for DRM Applications. Proc. DRM 2002, Washington, DC, November 18, pp. 1–15. Springer, Berlin.
3. Shamir A. and Van Someren N. (1999) Playing ‘Hide and Seek’ with Stored Keys. Proc. FC 1999, Anguilla, British West Indies, February 22–25, pp. 118–124. Springer, Berlin.
4. Billet O. , Gilbert H. and Ech-Chatbi C. (2005) Cryptanalysis of a White Box AES Implementation. Proc. SAC 2004, Waterloo, August 9–10, pp. 227–240. Springer, Berlin.
5. Tolhuizen L. (2012) Improved Cryptanalysis of an AES Implementation. Proc. 33rd WIC Symp. Information Theory in the Benelux, Boekelo, May 24–25, pp. 66–68. WIC (Werkgemeenschap voor Informatie-en Communicatietheorie), Eefde.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations;IEEE Transactions on Computers;2022
2. A DCA-resistant Implementation of SM4 for the White-box Context;Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks;2021-11-15
3. On Self-equivalence Encodings in White-Box Implementations;Selected Areas in Cryptography;2021
4. SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT;IEEE Transactions on Industrial Informatics;2020-03
5. Analyzing DFA Attack on AES-192;Lecture Notes on Data Engineering and Communications Technologies;2019-08-01