메뉴 건너뛰기




Volumn 2595, Issue , 2003, Pages 250-270

White-box cryptography and an AES implementation

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS;

EID: 21144457759     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36492-7_17     Document Type: Article
Times cited : (296)

References (28)
  • 2
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper-Resistant Devices
    • 5th International Workshop on Security Protocols Springer
    • R.J. Anderson, M.G. Kuhn, Low Cost Attacks on Tamper-Resistant Devices, pp. 125-136, 5th International Workshop on Security Protocols (LNCS 1361), Springer 1997.
    • (1997) LNCS , vol.1361 , pp. 125-136
    • Anderson, R.J.1    Kuhn, M.G.2
  • 3
    • 79251578513 scopus 로고    scopus 로고
    • On the (Im)possibility of Obfuscating Programs
    • Advances in Cryptology - Crypto 2001 Springer-Verlag
    • B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang, On the (Im)possibility of Obfuscating Programs, pp. 1-18, Advances in Cryptology - Crypto 2001 (LNCS 2139), Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 4
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Advances in Cryptology - Crypto '97 Springer-Verlag, 1997. Revised: Technion - C.S. Dept. - Technical Report CS0910-revised
    • E. Biham, A. Shamir, Differential Fault Analysis of Secret Key Cryptosystems, pp. 513-525, Advances in Cryptology - Crypto '97 (LNCS 1294), Springer-Verlag, 1997. Revised: Technion - C.S. Dept. - Technical Report CS0910-revised, 1997.
    • (1997) LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 5
    • 0004743521 scopus 로고    scopus 로고
    • Power Analysis of the Key Scheduling of the AES Candidates
    • Rome, Mar. 22-23
    • E. Biham, A. Shamir, Power Analysis of the Key Scheduling of the AES Candidates, presented at the 2nd AES Candidate Conference, Rome, Mar. 22-23 1999.
    • (1999) 2nd AES Candidate Conference
    • Biham, E.1    Shamir, A.2
  • 6
    • 3042641393 scopus 로고    scopus 로고
    • On the Importance of Eliminating Errors in Cryptographic Computations
    • D. Boneh, R.A. DeMillo, R.J. Lipton, On the Importance of Eliminating Errors in Cryptographic Computations, J. Cryptology 14(2), pp. 101-119, 2001.
    • (2001) J. Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 8
    • 0012022904 scopus 로고    scopus 로고
    • A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards
    • Rome, Italy, March 22-23
    • S. Chari, C. Jutla, J.R. Rao, P. Rohatgi, A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards, presented at the Second AES Candidate Conference, Rome, Italy, March 22-23, 1999.
    • (1999) Second AES Candidate Conference
    • Chari, S.1    Jutla, C.2    Rao, J.R.3    Rohatgi, P.4
  • 9
    • 23044474213 scopus 로고    scopus 로고
    • A White-Box des Implementation for DRM Applications
    • Proceedings of DRM 2002 - 2nd ACM Workshop on Digital Rights Management, Nov. 18, Springer-Verlag to appear
    • S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, A White-Box DES Implementation for DRM Applications, Proceedings of DRM 2002 - 2nd ACM Workshop on Digital Rights Management, Nov. 18, 2002 (Springer-Verlag LNCS, to appear).
    • (2002) LNCS
    • Chow, S.1    Eisen, P.2    Johnson, H.3    Van Oorschot, P.C.4
  • 10
    • 84947229190 scopus 로고    scopus 로고
    • An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs
    • Proceedings of ISC 2001 - Information Security, 4th International Conference Malaga, Spain, 1-3 October 2001, Springer-Verlag
    • S. Chow, Y. Gu, H. Johnson, V.A. Zakharov, An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs, pp. 144-155, Proceedings of ISC 2001 - Information Security, 4th International Conference (Malaga, Spain, 1-3 October 2001), LNCS 2200, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2200 , pp. 144-155
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.A.4
  • 11
    • 0027684663 scopus 로고
    • Operating System Protection Through Program Evolution
    • 1 Oct.
    • F. Cohen, Operating System Protection Through Program Evolution, Computers and Security 12(6), 1 Oct. 1993, pp. 565-584.
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 12
    • 0004777155 scopus 로고    scopus 로고
    • Resistance Against Implementation Attacks: A Comparative Study of the AES proposals
    • Rome, Italy, March 22-23
    • J. Daemen, V. Rijmen, Resistance Against Implementation Attacks: A Comparative Study of the AES proposals, presented at the Second AES Candidate Conference, Rome, Italy, March 22-23, 1999.
    • (1999) Second AES Candidate Conference
    • Daemen, J.1    Rijmen, V.2
  • 13
    • 84974694661 scopus 로고    scopus 로고
    • Bitslice Ciphers and Power Analysis Attacks
    • 7th International Workshop on East Software Encryption - FSE 2000 Springer-Verlag
    • J. Daemen, M. Peeters, G. van Assche, Bitslice Ciphers and Power Analysis Attacks, pp. 134-149, 7th International Workshop on East Software Encryption - FSE 2000 (LNCS 1978), Springer-Verlag, 2000.
    • (2000) LNCS , vol.1978 , pp. 134-149
    • Daemen, J.1    Peeters, M.2    Van Assche, G.3
  • 17
    • 23044532702 scopus 로고    scopus 로고
    • Discouraging Software Piracy Using Software Aging
    • Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001 Springer-Verlag
    • M. Jakobsson, M.K. Reiter, Discouraging Software Piracy Using Software Aging, pp. 1-12, Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001 (LNCS 2320), Springer-Verlag, 2002.
    • (2002) LNCS , vol.2320 , pp. 1-12
    • Jakobsson, M.1    Reiter, M.K.2
  • 18
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks against Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - Crypto '96 Springer-Verlag
    • P.C. Kocher, Timing Attacks against Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, pp. 104-113, Advances in Cryptology - Crypto '96 (LNCS 1109), Springer-Verlag, 1996.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 19
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Advances in Cryptology - Crypto '99 Springer-Verlag
    • P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, pp. 388-397, Advances in Cryptology - Crypto '99 (LNCS 1666), Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 21
    • 0024029607 scopus 로고
    • Efficient and Portable Combined Random Number Generators
    • P. L'Ecuyer, Efficient and Portable Combined Random Number Generators, Communications of the ACM 31(6), pp. 742-749, 1988.
    • (1988) Communications of the ACM , vol.31 , Issue.6 , pp. 742-749
    • L'Ecuyer, P.1
  • 22
    • 35248828253 scopus 로고    scopus 로고
    • November 1
    • National Institute of Standards and Technology (NIST), Round 2 Discussion Issues for the AES Development Effort, November 1, 1999. http://csrc.nist.gov/encryption/aes/round2/Round2WhitePaper.htm.
    • (1999) Round 2 Discussion Issues for the AES Development Effort
  • 23
    • 0003508558 scopus 로고    scopus 로고
    • FIPS Publication 197, 26 Nov.
    • National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), FIPS Publication 197, 26 Nov. 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    • (2001) Advanced Encryption Standard (AES)
  • 25
    • 0003197918 scopus 로고    scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • Mobile Agent Security Springer-Verlag
    • T. Sander, C.F. Tschudin, Protecting Mobile Agents Against Malicious Hosts, pp. 44-60, Mobile Agent Security (LNCS 1419), Springer-Verlag, 1998.
    • (1998) LNCS , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 26
    • 84956866637 scopus 로고    scopus 로고
    • Playing Hide and Seek with Keys
    • Financial Cryptography '99 Springer-Verlag
    • N. van Someren, A. Shamir, Playing Hide and Seek with Keys, pp. 118-124, Financial Cryptography '99 (LNCS 1648), Springer-Verlag, 1999.
    • (1999) LNCS , vol.1648 , pp. 118-124
    • Van Someren, N.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.