-
3
-
-
35248853376
-
A white-box des implementation for drm applications
-
Washington, DC, USA, Nov.
-
S. Chow, P. Eisen, H. Johnson and P. V. Oorschot, "A White-Box DES Implementation for DRM Applications," Proc. 2nd ACM Workshop on Digital Rights Management, Washington, DC, USA, Nov, 2002, pp. 1-15
-
(2002)
Proc. 2nd ACM Workshop on Digital Rights Management
, pp. 1-15
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Oorschot, P.V.4
-
4
-
-
67651183943
-
Mitigation of control channel jamming under node capture attacks
-
P. Tague. "Mitigation of Control Channel Jamming under Node Capture Attacks. " IEEE Transactions on Mobile Computing. Vol. 8, No. 9, 2009, pp. 1221-1234
-
(2009)
IEEE Transactions on Mobile Computing.
, vol.8
, Issue.9
, pp. 1221-1234
-
-
Tague, P.1
-
5
-
-
84861459260
-
Exact formulae for resilience in random key predistribution schemes
-
D. H. Yum, "Exact Formulae for Resilience in Random Key Predistribution Schemes. " IEEE Transactions on Wireless Communications. Vol. 11,No. 5, 2012, pp 1638-1642
-
(2012)
IEEE Transactions on Wireless Communications.
, vol.11
, Issue.5
, pp. 1638-1642
-
-
Yum, D.H.1
-
7
-
-
21144457759
-
White-Box Cryptography and an AES Implementation
-
St. John's, USA, Aug.
-
S. Chow, P. Eisen, H. Johnson, P. V. Oorschot, "White-Box Cryptography and an AES Implementation," Proc. The Ninth Workshop on Selected Areas in Cryptography, St. John's, USA, Aug., 2002, pp. 250-270
-
(2002)
Proc. The Ninth Workshop on Selected Areas in Cryptography
, pp. 250-270
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Oorschot, P.V.4
-
8
-
-
23044508311
-
Attacking an obfuscated cipher by injecting faults
-
Washington, DC, USA, Nov.
-
J. Matthias, B. Dan and F. Edward, "Attacking an obfuscated cipher by injecting faults," Proc. ACM Digital Rights Management Workshop 2002 Washington, DC, USA, Nov., 2002, pp. 16-31
-
(2002)
Proc. ACM Digital Rights Management Workshop 2002
, pp. 16-31
-
-
Matthias, J.1
Dan, B.2
Edward, F.3
-
9
-
-
24744446230
-
Clarifying obfuscation: Improving the security of white-box des
-
Albuquerque, USA, Apr.
-
H. Link, W. Neumann, "Clarifying obfuscation: improving the security of white-box DES," Prec. International Conference on Information Technology: Coding and Computing, Albuquerque, USA, Apr., 2005, pp. 679-684
-
(2005)
Prec. International Conference on Information Technology: Coding and Computing
, pp. 679-684
-
-
Link, H.1
Neumann, W.2
-
10
-
-
38549149185
-
Cryptanalysis of white-box des implementations with arbitrary external encodings
-
Ottawa, Canada, Aug.
-
B. Wyseur, W. Michiels, P. Gorissen and B. Preneel, "Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings," Proc. The 14th Annual Workshop on Selected Areas in Cryptography, Ottawa, Canada, Aug., 2007, pp. 264-277
-
(2007)
Proc. The 14th Annual Workshop on Selected Areas in Cryptography
, pp. 264-277
-
-
Wyseur, B.1
Michiels, W.2
Gorissen, P.3
Preneel, B.4
-
11
-
-
84863249503
-
Cryptanalysis of white box des implementations
-
Ottawa, Canada, Aug.
-
L. Goubin, J. M. Masereel and M. Quisquater, "Cryptanalysis of white box DES implementations," Proc. The 14th Annual Workshop on Selected Areas in Cryptography, Ottawa, Canada, Aug., 2007, pp. 1611-3349
-
(2007)
Proc. The 14th Annual Workshop on Selected Areas in Cryptography
, pp. 1611-3349
-
-
Goubin, L.1
Masereel, J.M.2
Quisquater, M.3
-
12
-
-
35048833291
-
Cryptanalysis of a White Box AES Implementation
-
Waterloo, Canada, Aug.
-
O. Billet, H. Gilbert, C. Ech-Chatbi, "Cryptanalysis of a White Box AES Implementation," Prec. of Selected Areas in Cryptography, Waterloo, Canada, Aug., 2004, pp. 227-240
-
(2004)
Prec. of Selected Areas in Cryptography
, pp. 227-240
-
-
Billet, O.1
Gilbert, H.2
Ech-Chatbi, C.3
-
13
-
-
70350677133
-
Cryptanalysis of a Generic Class of White-Box Implementations
-
Sackville, Canada, Aug.
-
W. Michiels, P. Gorissen, and H. Hollmann, "Cryptanalysis of a Generic Class of White-Box Implementations," Proc. The 15th International Workshop on Selected Areas in Cryptography, Sackville, Canada, Aug. 2008, pp. 414-428
-
(2008)
Proc. The 15th International Workshop on Selected Areas in Cryptography
, pp. 414-428
-
-
Michiels, W.1
Gorissen, P.2
Hollmann, H.3
-
14
-
-
84984964164
-
White-box cryptography and a white-box implementation of the SMS4 algorithm
-
Y. Xiao, X. Lai. "White-box cryptography and a white-box implementation of the SMS4 algorithm. " In Proc. Chaincrypto 2009, pp. 24-34
-
(2009)
Proc. Chaincrypto
, pp. 24-34
-
-
Xiao, Y.1
Lai, X.2
-
16
-
-
84872510835
-
Cryptanalysis of the xiao-lai white-box aes implementation, in selected areas in cryptography
-
Springer-Verlag
-
Y. De Mulder, P. Roelse, and B. Preneel, "Cryptanalysis of the Xiao-Lai White-Box AES Implementation, In Selected Areas in Cryptography," 19th Annual International Workshop, SAC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012, pp. 34-49
-
(2012)
19th Annual International Workshop, SAC 2012, Lecture Notes in Computer Science
, pp. 34-49
-
-
De Mulder, Y.1
Roelse, P.2
Preneel, B.3
-
17
-
-
35248818760
-
A toolbox for cryptanalysis: Linear and affine equivalence algorithms
-
Springer
-
A. Biryukov, C. De Canniere, A. Braeken, and B. Preneel. "A toolbox for cryptanalysis: Linear and affine equivalence algorithms. " In Eli Biham, editor, EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, Springer, 2003, pp. 33-50
-
(2003)
Eli Biham, Editor, EUROCRYPT 2656 of Lecture Notes in Computer Science
, pp. 33-50
-
-
Biryukov, A.1
De Canniere, C.2
Braeken, A.3
Preneel, B.4
-
18
-
-
80052793223
-
Protecting white-box AES with dual ciphers
-
In K. Rhee and D. Nyang, editors
-
M. Karroumi, "Protecting white-box AES with dual ciphers. " In K. Rhee and D. Nyang, editors, ICISC, volume 6829 of Lecture Notes in Computer Science, pp. 278-291
-
ICISC 6829 of Lecture Notes in Computer Science
, pp. 278-291
-
-
Karroumi, M.1
-
20
-
-
38149070897
-
Analysis of the sms4 block cipher
-
F. Liu, W. Ji, L. Hu, J. Ding, S. Lv, A. Pyshkin, and R. Weinmann. "Analysis of the SMS4 Block Cipher. " ACISP 2007, LNCS 4586, 2007, pp. 158-170
-
(2007)
ACISP 2007, LNCS
, vol.4586
, pp. 158-170
-
-
Liu, F.1
Ji, W.2
Hu, L.3
Ding, J.4
Lv, S.5
Pyshkin, A.6
Weinmann, R.7
-
21
-
-
84958748914
-
In how many ways can you write Rijndael?
-
Zheng, Y. (ed. )
-
E. Barkan, E. Biham, "In how many ways can you write Rijndael?" In: Zheng, Y. (ed. ) ASIACRYPT 2002. LNCS, vol. 2501, pp. 160-175
-
ASIACRYPT 2002. LNCS
, vol.2501
, pp. 160-175
-
-
Barkan, E.1
Biham, E.2
-
22
-
-
24144476253
-
More dual Rijndaels
-
H. Dobbertin, V. Rijmen, A. Sowa (eds. )
-
H. Raddum, More dual Rijndaels. In: H. Dobbertin, V. Rijmen, A. Sowa (eds. ) AES 2005. LNCS, vol. 3373, pp. 142-147
-
AES 2005. LNCS
, vol.3373
, pp. 142-147
-
-
Raddum, H.1
-
25
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Lecture Notes in Computer Science, Vol. 1419, 1998, pp. 92-113.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
|