-
1
-
-
84957018842
-
Low cost attacks on tamper-resistant devices
-
LNCS 1361, Springer-Verlag, doi: 10.1007/BFb0028165
-
Anderson R, Kuhn M. Low cost attacks on tamper-resistant devices. In: Proc. of the 5th Int'l Workshop on Security Protocols. LNCS 1361, Springer-Verlag, 1997. 125-136. [doi: 10.1007/BFb0028165]
-
(1997)
Proc. of the 5th Int'l Workshop on Security Protocols
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
3
-
-
0004743521
-
Power analysis of the key scheduling of the AES candidates
-
Rome
-
Biham E, Shamir A. Power analysis of the key scheduling of the AES candidates. In: Proc. of the 2nd AES Candidate Conf. Rome, 1999. 22-23.
-
(1999)
Proc. of the 2nd AES Candidate Conf.
, pp. 22-23
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
3042641393
-
On the importance of eliminating errors in cryptographic computations
-
doi: 10.1007/s001450010016
-
Boneh D, DeMillo RA, Lipton RJ. On the importance of eliminating errors in cryptographic computations. Journal of Cryptology, 2001, 14(2): 101-119. [doi: 10.1007/s001450010016]
-
(2001)
Journal of Cryptology
, vol.14
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
5
-
-
21144457759
-
White-Box cryptography and an AES implementation
-
LNCS 2595, Newfoundland: Springer-Verlag, doi: 10.1007/3-540-36492-7_17
-
Chow S, Eisen P, Johnson H, Van Oorschot PC. White-Box cryptography and an AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 2595, Newfoundland: Springer-Verlag, 2002. 250-270. [doi: 10.1007/3-540-36492-7_17]
-
(2002)
Proc. of the Selected Areas in Cryptography
, pp. 250-270
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
van Oorschot, P.C.4
-
6
-
-
35248853376
-
A white-box DES implementation for DRM applications
-
LNCS 2692, Heidelberg: Springer-Verlag, doi: 10.1007/978-3-540-44993-5_1
-
Chow S, Eisen P, Johnson H, Van Oorschot PC. A white-box DES implementation for DRM applications. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2692, Heidelberg: Springer-Verlag, 2002. 1-15. [doi: 10.1007/978-3-540-44993-5_1]
-
(2002)
Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management
, pp. 1-15
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
van Oorschot, P.C.4
-
7
-
-
35248830740
-
Attacking an obfuscated cipher by injecting faults
-
LNCS 2696, Heidelberg: Springer-Verlag, doi: 10.1007/978-3-540-44993-5_2
-
Jacob M, Boneh D, Felten E. Attacking an obfuscated cipher by injecting faults. In: Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management. LNCS 2696, Heidelberg: Springer-Verlag, 2002. 16-31. [doi: 10.1007/978-3-540-44993-5_2]
-
(2002)
Proc. of the ACM Workshop on Security and Privacy in Digital Rights Management
, pp. 16-31
-
-
Jacob, M.1
Boneh, D.2
Felten, E.3
-
8
-
-
24744446230
-
Clarifying obfuscation: Improving the security of white-box DES
-
Washington: IEEE Computer Society, doi: 10.1109/ITCC.2005.100
-
Link HE, Neumann WD. Clarifying obfuscation: Improving the security of white-box DES. In: Proc. of the Int'l Conf. on Information Technology: Coding and Computing. Washington: IEEE Computer Society, 2005. 679-684. [doi: 10.1109/ITCC.2005.100]
-
(2005)
Proc. of the Int'l Conf. on Information Technology: Coding and Computing
, pp. 679-684
-
-
Link, H.E.1
Neumann, W.D.2
-
9
-
-
38549149185
-
Cryptanalysis of white-box DES implementations with arbitrary external encodings
-
LNCS 4876, Ottawa: Springer-Verlag, doi: 10.1007/978-3-540-77360-3_17
-
Wyseur B, Michiels W, Gorissen P, Preneel B. Cryptanalysis of white-box DES implementations with arbitrary external encodings. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007. 264-277. [doi: 10.1007/978-3-540-77360-3_17]
-
(2007)
Proc. of the Selected Areas in Cryptography
, pp. 264-277
-
-
Wyseur, B.1
Michiels, W.2
Gorissen, P.3
Preneel, B.4
-
10
-
-
38549140489
-
Cryptanalysis of white box DES implementations
-
LNCS 4876, Ottawa: Springer-Verlag, doi: 10.1007/978-3-540-77360-3_18
-
Goubin L, Masereel JM, Quisquater M. Cryptanalysis of white box DES implementations. In: Proc. of the Selected Areas in Cryptography. LNCS 4876, Ottawa: Springer-Verlag, 2007. 278-295. [doi: 10.1007/978-3-540-77360-3_18]
-
(2007)
Proc. of the Selected Areas in Cryptography
, pp. 278-295
-
-
Goubin, L.1
Masereel, J.M.2
Quisquater, M.3
-
11
-
-
35048833291
-
Cryptanalysis of a white box AES implementation
-
LNCS 3357, Berlin, Heidelberg: Springer-Verlag, doi: 10.1007/978-3-540-30564-4_16
-
Billet.O, Gilbert.H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proc. of the Selected Areas in Cryptography. LNCS 3357, Berlin, Heidelberg: Springer-Verlag, 2005. 227-240. [doi: 10.1007/978-3-540-30564-4_16]
-
(2005)
Proc. of the Selected Areas in Cryptography
, pp. 227-240
-
-
Billet, O.1
Gilbert, H.2
Ech-Chatbi, C.3
-
12
-
-
70350677133
-
Cryptanalysis of a generic class of white-box implementations
-
LNCS 5381, Berlin, Heidelberg: Springer-Verlag, doi: 10.1007/978-3-642-04159-4_27
-
Michiels W, Gorissen P, Hollmann HDL. Cryptanalysis of a generic class of white-box implementations. In: Proc. of the Selected Areas in Cryptography. LNCS 5381, Berlin, Heidelberg: Springer-Verlag, 2009. 414-428. [doi: 10.1007/978-3-642-04159-4_27]
-
(2009)
Proc. of the Selected Areas in Cryptography
, pp. 414-428
-
-
Michiels, W.1
Gorissen, P.2
Hollmann, H.D.L.3
-
13
-
-
84984964164
-
White-Box cryptography and implementations of SMS4
-
Chinese source. Beijing: Science Press
-
Xiao YY, Lai XJ. White-Box cryptography and implementations of SMS4. In: Proc. of the 2009 CACR Annual Meeting. Beijing: Science Press, 2009. 24-34 (in Chinese with English abstract).
-
(2009)
Proc. of the 2009 CACR Annual Meeting
, pp. 24-34
-
-
Xiao, Y.Y.1
Lai, X.J.2
-
14
-
-
84885346067
-
SMS4 cryptographic algorithms used by wireless LAN products
-
Chinese source. The Office of Security Commercial Code Administration (OSCCA). Beijing
-
The Office of Security Commercial Code Administration (OSCCA). SMS4 cryptographic algorithms used by wireless LAN products. Beijing, 2006 (in Chinese).
-
(2006)
-
-
|