-
1
-
-
0034828870
-
Cryptographic security for mobile code
-
In 2001, IEEE Press
-
J. Algesheimer, C. Cachin, J. Camenisch, and G. Karjoth. Cryptographic security for mobile code. In 2001 IEEE Symposium on Security & Privacy, pages 2-11, IEEE Press, 2001
-
(2001)
IEEE Symposium On Security & Privacy
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
3
-
-
35048833291
-
Cryptanalysis of a white-box AES implementation
-
Selected Areas in Cryptography - SAC 2004, Springer
-
O. Billet, H. Gilbert, and C. Ech-Chatbi. Cryptanalysis of a white-box AES implementation. In Selected Areas in Cryptography - SAC 2004, volume 3357 of Lecture Notes in Computer Science, pages 227-240. Springer, 2004
-
(2004)
Lecture Notes In Computer Science
, vol.3357
, pp. 227-240
-
-
Billet, O.1
Gilbert, H.2
Ech-Chatbi, C.3
-
4
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Advances in Cryptology - CRYPTO 2001, Springer
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer, 2001
-
(2001)
Lecture Notes In Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
21144457759
-
White-box cryptography and an AES implementation
-
Selected Areas in Cryptography - SAC 2002, Springer
-
S. Chow, P. Eisen, H. Johnson, and P.C. van Oorschot. White-box cryptography and an AES implementation. In Selected Areas in Cryptography - SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 250-270. Springer, 2003
-
(2003)
Lecture Notes In Computer Science
, vol.2595
, pp. 250-270
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
van Oorschot, P.C.4
-
6
-
-
35248853376
-
A white-box DES implementation for DRM applications
-
Digital Rights Management - DRM 2002, Springer
-
S. Chow, P. Eisen, H. Johnson, and P.C. van Oorschot. A white-box DES implementation for DRM applications. In Digital Rights Management - DRM 2002, volume 2696 of Lecture Notes in Computer Science, pages 1-15. Springer, 2003
-
(2003)
Lecture Notes In Computer Science
, vol.2696
, pp. 1-15
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
van Oorschot, P.C.4
-
7
-
-
84893197920
-
-
COSIC, Katholieke Universiteit Leuven, October
-
J. Cappaert, B. Wyseur, and B. Preneel. Software security techniques. Internal report, COSIC, Katholieke Universiteit Leuven, October 2004
-
(2004)
Software Security Techniques. Internal Report
-
-
Cappaert, J.1
Wyseur, B.2
Preneel, B.3
-
8
-
-
38549128537
-
-
Cryptology ePrint Archive, Report 2007/035, February, Available at URL
-
Louis Goubin, Jean-Michel Masereel, and Michael Quisquater. Cryptanalysis of white box DES implementations. Cryptology ePrint Archive, Report 2007/035, February 2007. Available at URL http://eprint.iacr.org/2007/035
-
(2007)
Cryptanalysis of White Box DES Implementations
-
-
Goubin, L.1
Masereel, J.-M.2
Quisquater, M.3
-
9
-
-
35248830740
-
Attacking an obfuscated cipher by injecting faults
-
Digital Rights Management - DRM 2002
-
M. Jacob, D. Boneh, and E.W. Felten. Attacking an obfuscated cipher by injecting faults. In Digital Rights Management - DRM 2002, volume 2696 of Lecture Notes in Computer Science, pages 16-31. Springer, 2003
-
(2003)
Lecture Notes In Computer Science, Pages 16-31. Springer
, vol.2696
-
-
Jacob, M.1
Boneh, D.2
Felten, E.W.3
-
10
-
-
24744446230
-
Clarifying obfuscation: Improving the security of white-box DES
-
IEEE Press, Also available as Cryptology ePrint Archive, Report 2004/025, January 2004 at URL
-
H.E. Link and W.D. Neumann. Clarifying obfuscation: Improving the security of white-box DES. In International Conference on Information Technology: Coding and Computing - ITCC 2005, volume 1, pages 679-684. IEEE Press, 2005. Also available as Cryptology ePrint Archive, Report 2004/025, January 2004 at URL http://eprint.iacr.org/2004/025
-
(2005)
International Conference On Information Technology: Coding and Computing - ITCC 2005
, vol.1
, pp. 679-684
-
-
Link, H.E.1
Neumann, W.D.2
-
14
-
-
21144442036
-
Revisiting software protection
-
Information Security - ISC 2003, Springer
-
P.C. van Oorschot. Revisiting software protection. In Information Security - ISC 2003, volume 2851 of Lecture Notes in Computer Science, pages 1-13. Springer, 2003
-
(2003)
Lecture Notes In Computer Science
, vol.2851
, pp. 1-13
-
-
van Oorschot, P.C.1
-
15
-
-
70350623005
-
-
Cryptology ePrint Archive, Report 2007/104, March 2007. Available at URL
-
Brecht Wyseur, Wil Michiels, Paul Gorissen, and Bart Preneel. Cryptanalysis of white-box DES implementations with arbitrary external encodings. Cryptology ePrint Archive, Report 2007/104, March 2007. Available at URL http://eprint.iacr.org/2007/104.
-
Cryptanalysis of White-box DES Implementations With Arbitrary External Encodings
-
-
Wyseur, B.1
Michiels, W.2
Gorissen, P.3
Preneel, B.4
|