-
1
-
-
35248815619
-
-
Tamper-Resistant Methods and Apparatus, U.S. Patent No. 5,892,899, 1999
-
D. Aucsmith, G. Graunke, Tamper-Resistant Methods and Apparatus, U.S. Patent No. 5,892,899, 1999.
-
-
-
Aucsmith, D.1
Graunke, G.2
-
2
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Advances in Cryptology - Crypto 2001 Springer-Verlag
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang, On the (Im)possibility of Obfuscating Programs, pp. 1-18 in: Advances in Cryptology - Crypto 2001 (LNCS 2139), Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Advances in Cryptology - Crypto '97 Springer-Verlag, Revised: Technion - Computer Science Department - Technical Report cs0910-revised, 1997
-
Eli Biham, Adi Shamir, Differential Fault Analysis of Secret Key Cryptosystems, pp. 513-525, Advances in Cryptology - Crypto '97 (LNCS 1294), Springer-Verlag, 1997. Revised: Technion - Computer Science Department - Technical Report cs0910-revised, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
35248851593
-
White-Box Cryptography and an AES Implementation
-
Proceedings of the Ninth Workshop on Selected Areas in Cryptography (SAC 2002), August 15-16, to appear
-
S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, White-Box Cryptography and an AES Implementation, Proceedings of the Ninth Workshop on Selected Areas in Cryptography (SAC 2002), August 15-16, 2002 (Springer-Verlag LNCS, to appear).
-
(2002)
Springer-Verlag LNCS
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.C.4
-
6
-
-
0003431423
-
-
Dover Publications, New York
-
Leonard E. Dickson, Linear Groups, with an Exposition of Galois Field Theory, p. 77, Dover Publications, New York, 1958.
-
(1958)
Linear Groups, with An Exposition of Galois Field Theory
, pp. 77
-
-
Dickson, L.E.1
-
7
-
-
35248896352
-
Attacking an obfuscated cipher by injecting faults
-
proceedings of 2nd ACM workshop on Digital Rights Management - ACM ccs-9 Workshop DRM 2002 to appear
-
M. Jacob, D. Boneh, E. Feiten, Attacking an obfuscated cipher by injecting faults, proceedings of 2nd ACM workshop on Digital Rights Management - ACM ccs-9 Workshop DRM 2002 (Springer-Verlag LNCS to appear).
-
Springer-Verlag LNCS
-
-
Jacob, M.1
Boneh, D.2
Feiten, E.3
-
8
-
-
23044532702
-
Discouraging Software Piracy Using Software Aging
-
Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001 Springer-Verlag
-
M. Jakobsson, M.K. Reiter, Discouraging Software Piracy Using Software Aging, pp.1-12 in: Security and Privacy in Digital Rights Management - ACM CCS-8 Workshop DRM 2001 (LNCS 2320), Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 1-12
-
-
Jakobsson, M.1
Reiter, M.K.2
-
9
-
-
84955573096
-
How to protect DES against exhaustive key search
-
Advances in Cryptology - Crypto '96
-
J. Kilian, P. Rogaway, How to protect DES against exhaustive key search, pp.252-267 in: Advances in Cryptology - Crypto '96, Springer-Verlag LNCS, 1996.
-
(1996)
Springer-Verlag LNCS
, pp. 252-267
-
-
Kilian, J.1
Rogaway, P.2
-
10
-
-
84939573910
-
Differential Power Analysis
-
Advances in Cryptology - Crypto '99 Springer-Verlag
-
Paul Kocher, Joshua Jaffe, Benjamin Jun, Differential Power Analysis, pp. 388-397, Advances in Cryptology - Crypto '99 (LNCS 1666), Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
11
-
-
35248876711
-
-
CRC Press, (5th printing with corrections)
-
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, pp. 250-259, CRC Press, 2001 (5th printing with corrections). Down-loadable from http://wvw.cacr.math.uwaterloo.ca/hac/
-
(2001)
Handbook of Applied Cryptography
, pp. 250-259
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
|