메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 679-684

Clarifying obfuscation: Improving the security of white-box des

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; CRYPTOGRAPHY; STATISTICAL METHODS;

EID: 24744446230     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2005.100     Document Type: Conference Paper
Times cited : (62)

References (16)
  • 1
    • 0025230154 scopus 로고
    • Secure circuit evaluation: A protocol based on hiding information from an oracle
    • M. Abadi and J. Feigenbaum. Secure circuit evaluation: A protocol based on hiding information from an oracle. Journal of Cryptology, 2(1): 1-12, 1990.
    • (1990) Journal of Cryptology , vol.2 , Issue.1 , pp. 1-12
    • Abadi, M.1    Feigenbaum, J.2
  • 5
    • 21144457759 scopus 로고    scopus 로고
    • A white-box cryptography and an AES implementation
    • Proceedings of SAC 2002. Springer
    • S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. A white-box cryptography and an AES implementation. In Proceedings of SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 250-270. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 250-270
    • Chow, S.1    Eisen, P.2    Johnson, H.3    Van Oorschot, P.4
  • 7
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Department of Computer Science, University of Auckland, July
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
    • (1997) Technical Report , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 9
    • 84861239703 scopus 로고    scopus 로고
    • http://www.dvdcca.org/css.
  • 10
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. Lecture Notes in Computer Science, 1419:90-111, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 90-111
    • Hohl, F.1
  • 12
    • 84947930522 scopus 로고    scopus 로고
    • Protecting secret keys in a compromised computational system
    • W. Mitchell. Protecting secret keys in a compromised computational system. Lecture Notes In Computer Science, 1768:448-462, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1768 , pp. 448-462
    • Mitchell, W.1
  • 16
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Toronto, Ontario, October 1986. IEEE
    • A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In 27th Annual Symposium on Foundations of Computer Science, pages 162-167, Toronto, Ontario, October 1986 1986. IEEE.
    • (1986) 27th Annual Symposium on Foundations of Computer Science , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.