-
2
-
-
67651183943
-
Mitigation of Control Channel Jamming under Node Capture Attacks
-
Patrick, T.; Li, M.; Radha, P. Mitigation of Control Channel Jamming under Node Capture Attacks. IEEE Trans. Mob. Comput. 2009, 8, 1221–1234.
-
(2009)
IEEE Trans. Mob. Comput
, vol.8
, pp. 1221-1234
-
-
Patrick, T.1
Li, M.2
Radha, P.3
-
3
-
-
58449099938
-
Taxonomy of Security Attacks in Sensor Networks and Countermeasures
-
Hanoi, Vietnam, 13–15December
-
Tanya, R.; Shiuhpyng, S.; Shankar, S. Taxonomy of Security Attacks in Sensor Networks and Countermeasures. In Proceedings of the first IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, 13–15 December 2006; p. 94.
-
(2006)
In Proceedings of the First IEEE International Conference on System Integration and Reliability Improvements
, pp. 94
-
-
Tanya, R.1
Shiuhpyng, S.2
Shankar, S.3
-
4
-
-
84861459260
-
Exact Formulae for Resilience in Random Key Predistribution Schemes
-
Yum, D.H.; Lee, P.J. Exact Formulae for Resilience in Random Key Predistribution Schemes. IEEE Trans. Wirel. Commun. 2012, 11, 1638–1642.
-
(2012)
IEEE Trans. Wirel. Commun
, vol.11
, pp. 1638-1642
-
-
Yum, D.H.1
Lee, P.J.2
-
5
-
-
84930649483
-
-
Carleton University: Ottawa, ON, Canada
-
Stanley, C.; Philip, A.E.; Harold, J.; Paul, C.V.O. A White-Box DES Implementation for DRM Applications; Carleton University: Ottawa, ON, Canada, 2002; pp. 1–15.
-
(2002)
A White-Box DES Implementation for DRM Applications
, pp. 1-15
-
-
Stanley, C.1
Philip, A.E.2
Harold, J.3
Paul, C.4
-
6
-
-
84930617916
-
-
Springer: Berlin/Heidelberg, Germany
-
Stanley, C.; Philip, A.E.; Harold, J.; Paul, C.V.O. White-Box Cryptography and an AES Implementation; Springer: Berlin/Heidelberg, Germany, 2002; pp. 250–270.
-
(2002)
White-Box Cryptography and an AES Implementation
, pp. 250-270
-
-
Stanley, C.1
Philip, A.E.2
Harold, J.3
Paul, C.4
-
7
-
-
84930635115
-
Clarifying Obfuscation: Improving the Security of White-Box DES
-
Hamilton, E.L.; William, D.N. Clarifying Obfuscation: Improving the Security of White-Box DES. IEEE Comput. Soc. 2005, 679–684.
-
(2005)
IEEE Comput. Soc
, pp. 679-684
-
-
Hamilton, E.L.1
William, D.N.2
-
8
-
-
80655124303
-
A Secure Implementation of White-Box AES
-
Jeju, Korea, 10–12 December
-
Xiao, Y.; Lai, X. A Secure Implementation of White-Box AES. In Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009 (CSA’09), Jeju, Korea, 10–12 December 2009; pp. 1–6.
-
(2009)
In Proceedings of the 2Nd International Conference on Computer Science and Its Applications
, pp. 1-6
-
-
Xiao, Y.1
Lai, X.2
-
9
-
-
80052793223
-
Protecting White-Box AES with Dual Ciphers
-
Rhee, K.-H., Nyang, D., Eds.; Springer: Berlin/Heidelberg, Germany
-
Karroumi, M. Protecting White-Box AES with Dual Ciphers. In Information Security and Cryptology—ICISC 2010; Rhee, K.-H., Nyang, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6829, pp. 278–291.
-
(2011)
Information Security and Cryptology—ICISC 2010
, vol.6829
, pp. 278-291
-
-
Karroumi, M.1
-
11
-
-
35048833291
-
Cryptanalysis of a White Box AES Implementation
-
Handschuh, H., Hasan, M.A., Eds.; Springer: Berlin/Heidelberg, Germany
-
Billet, O.; Gilbert, H.; Ech-Chatbi, C. Cryptanalysis of a White Box AES Implementation. In Selected Areas in Cryptography; Handschuh, H., Hasan, M.A., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3357, pp. 227–240.
-
(2005)
Selected Areas in Cryptography
, vol.3357
, pp. 227-240
-
-
Billet, O.1
Gilbert, H.2
Ech-Chatbi, C.3
-
12
-
-
70350677133
-
-
Springer: Berlin/Heidelberg, Germany
-
Michiels, W.; Gorissen, P.; Hollmann, H.D.L. Cryptanalysis of a Generic Class of White-Box Implementations; Springer: Berlin/Heidelberg, Germany, 2008; pp. 414–428.
-
(2008)
Cryptanalysis of a Generic Class of White-Box Implementations
, pp. 414-428
-
-
Michiels, W.1
Gorissen, P.2
Hollmann, H.3
-
13
-
-
84872510835
-
Cryptanalysis of the Xiao–Lai White-Box AES Implementation
-
Knudsen, L., Wu, H., Eds.; Springer: Berlin/Heidelberg, Germany
-
De Mulder, Y.; Roelse, P.; Preneel, B. Cryptanalysis of the Xiao–Lai White-Box AES Implementation. In Selected Areas in Cryptography; Knudsen, L., Wu, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; Volume 7707, pp. 34–49.
-
(2013)
Selected Areas in Cryptography
, vol.7707
, pp. 34-49
-
-
De Mulder, Y.1
Roelse, P.2
Preneel, B.3
-
14
-
-
84912099206
-
A lightweight white-box symmetric encryption algorithm against node capture for WSNs
-
Istanbul, Turkey, 6–9 April
-
Shi, Y.; He, Z. A lightweight white-box symmetric encryption algorithm against node capture for WSNs. In Proceedings of 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 3058–3063.
-
(2014)
In Proceedings of 2014 IEEE Wireless Communications and Networking Conference (WCNC)
, pp. 3058-3063
-
-
Shi, Y.1
He, Z.2
-
15
-
-
23044508311
-
-
Springer, Berlin/Heidelberg, Germany
-
Matthias, J.; Dan, B.; Edward, W.F. Attacking an Obfuscated Cipher by Injecting Faults; Springer: Berlin/Heidelberg, Germany, 2002; pp. 16–31.
-
(2002)
Attacking an Obfuscated Cipher by Injecting Faults
, pp. 16-31
-
-
Matthias, J.1
Dan, B.2
Edward, W.F.3
-
16
-
-
38549149185
-
-
Springer, Berlin/Heidelberg, Germany
-
Brecht, W.; Wil, M.; Paul, G.; Bart, P. Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings; Springer: Berlin/Heidelberg, Germany, 2007; pp. 264–277.
-
(2007)
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
, pp. 264-277
-
-
Brecht, W.1
Wil, M.2
Paul, G.3
Bart, P.4
-
17
-
-
38549140489
-
-
Springer, Berlin/Heidelberg, Germany
-
Goubin, L.; Masereel, J.-M.; Quisquater, M. Cryptanalysis of White Box DES Implementations; Springer: Berlin/Heidelberg, Germany, 2007; pp. 278–295.
-
(2007)
Cryptanalysis of White Box DES Implementations
, pp. 278-295
-
-
Goubin, L.1
Masereel, J.-M.2
Quisquater, M.3
-
19
-
-
84863298806
-
White-Box Encryption Algorithm for Computing with Mobile Agents
-
Shi, Y.; Lin, J.; Zhang, C. A White-Box Encryption Algorithm for Computing with Mobile Agents. J. Internet Technol. 2011, 12, 981–994.
-
(2011)
J. Internet Technol
, vol.12
, pp. 981-994
-
-
Shi, Y.1
Lin, J.2
Zhang, C.A.3
-
20
-
-
0001943763
-
-
In Mobile Agents and Security; Vigna, G., Ed.; Springer: Berlin/Heidelberg, Germany, 1998
-
Hohl, F. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In Mobile Agents and Security; Vigna, G., Ed.; Springer: Berlin/Heidelberg, Germany, 1998; Volume 1419, pp. 92–113.
-
Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
21
-
-
35248818760
-
-
Springer: Berlin/Heidelberg, Germany
-
Biryukov, A.; Cannière, C.D.; Braeken, A.; Preneel, B. A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms; Springer: Berlin/Heidelberg, Germany, 2003; pp. 33–50.
-
(2003)
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
, pp. 33-50
-
-
Biryukov, A.1
Cannière, C.D.2
Braeken, A.3
Preneel, B.4
-
22
-
-
84902603143
-
Two Attacks on a White-Box AES Implementation
-
Lange, T., Lauter, K., Lisoněk, P., Eds.; Springer: Berlin/Heidelberg, Germany
-
Lepoint, T.; Rivain, M.; de Mulder, Y.; Roelse, P.; Preneel, B. Two Attacks on a White-Box AES Implementation. In Selected Areas in Cryptography—SAC 2013; Lange, T., Lauter, K., Lisoněk, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 265–285.
-
(2014)
Selected Areas in Cryptography—SAC 2013
, pp. 265-285
-
-
Lepoint, T.1
Rivain, M.2
De Mulder, Y.3
Roelse, P.4
Preneel, B.5
-
23
-
-
84885349351
-
Efficient attack to white-box SMS4 implementation
-
(In Chinese)
-
Lin, T.; Lai, X. Efficient attack to white-box SMS4 implementation. J. Softw. 2013, 24, 2238–2249. (In Chinese)
-
(2013)
J. Softw
, vol.24
, pp. 2238-2249
-
-
Lin, T.1
Lai, X.2
-
24
-
-
66249111647
-
SMS4 Encryption Algorithm for Wireless Networks
-
Diffie, W.; Ledin, G. SMS4 Encryption Algorithm for Wireless Networks. IACR Cryptol. ePrint Arch. 2008, 2008, 329.
-
(2008)
IACR Cryptol. Eprint Arch.
, vol.2008
, pp. 329
-
-
Diffie, W.1
Ledin, G.2
-
25
-
-
62949212066
-
Analysis of the SMS4 Block Cipher
-
Pieprzyk, J., Ghodosi, H., Dawson, E., Eds.; Springer: Berlin/Heidelberg, Germany
-
Liu, F.; Ji, W.; Hu, L.; Ding, J.; Lv, S.; Pyshkin, A.; Weinmann, R.-P. Analysis of the SMS4 Block Cipher. In Information Security and Privacy; Pieprzyk, J., Ghodosi, H., Dawson, E., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4586, pp. 158–170.
-
(2007)
Information Security and Privacy
, vol.4586
, pp. 158-170
-
-
Liu, F.1
Ji, W.2
Hu, L.3
Ding, J.4
Lv, S.5
Pyshkin, A.6
Weinmann, R.-P.7
-
26
-
-
84958748914
-
How Many Ways Can You Write Rijndael?
-
Zheng, Y., Ed.; Springer: Berlin/Heidelberg, Germany
-
Barkan, E.; Biham, E. In How Many Ways Can You Write Rijndael? In Advances in Cryptology—ASIACRYPT 2002; Zheng, Y., Ed.; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2501, pp. 160–175.
-
(2002)
In Advances in Cryptology—ASIACRYPT 2002
, vol.2501
, pp. 160-175
-
-
Barkan, E.1
Biham, E.2
-
27
-
-
24144476253
-
More Dual Rijndaels
-
Dobbertin, H., Rijmen, V., Sowa, A., Eds.; Springer: Berlin/Heidelberg, Germany
-
Raddum, H. More Dual Rijndaels. In Advanced Encryption Standard—AES; Dobbertin, H., Rijmen, V., Sowa, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3373, pp. 142–147.
-
(2005)
Advanced Encryption Standard—AES
, vol.3373
, pp. 142-147
-
-
Raddum, H.1
-
28
-
-
78751487117
-
Methods for practical whitebox cryptography
-
Jeju, Korea, 17–19 November
-
Park, J.-Y.; Yi, O.; Choi, J.-S. Methods for practical whitebox cryptography. In Proceedings of the 2010 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 17–19 November 2010; pp. 474–479.
-
(2010)
In Proceedings of the 2010 International Conference on Information and Communication Technology Convergence (ICTC)
, pp. 474-479
-
-
Park, J.-Y.1
Yi, O.2
Choi, J.-S.3
-
29
-
-
35348832710
-
Intel Mote 2: An advanced platform for demanding sensor network applications
-
San Diego, CA, USA, 2–4 November 2005; ACM: New York, NY, USA
-
Adler, R.; Flanigan, M.; Huang, J.; Kling, R.; Kushalnagar, N.; Nachman, L.; Wan, C.-Y.; Yarvis, M. Intel Mote 2: An advanced platform for demanding sensor network applications. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, San Diego, CA, USA, 2–4 November 2005; ACM: New York, NY, USA, 2005; pp. 298–298.
-
(2005)
Proceedings of the 3Rd International Conference on Embedded Networked Sensor Systems
, pp. 298
-
-
Adler, R.1
Flanigan, M.2
Huang, J.3
Kling, R.4
Kushalnagar, N.5
Nachman, L.6
Wan, C.-Y.7
Yarvis, M.8
-
30
-
-
77952002609
-
Linear and Difierential Cryptanalysis of Reduced SMS4 Block Cipher
-
Kim, T.; Kim, J.; Hong, S.; Sung, J. Linear and Difierential Cryptanalysis of Reduced SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2008, 281.
-
(2008)
IACR Cryptol. Eprint Arch.
, pp. 281
-
-
Kim, T.1
Kim, J.2
Hong, S.3
Sung, J.4
-
31
-
-
70350635970
-
The Cryptanalysis of Reduced-Round SMS 4
-
Avanzi, R., Keliher, L., Sica, F., Eds.; Springer: Berlin/Heidelberg, Germany
-
Etrog, J.; Robshaw, M.B. The Cryptanalysis of Reduced-Round SMS 4. In Selected Areas in Cryptography; Avanzi, R., Keliher, L., Sica, F., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5381, pp. 51–65.
-
(2009)
Selected Areas in Cryptography
, vol.5381
, pp. 51-65
-
-
Etrog, J.1
Robshaw, M.B.2
-
32
-
-
70350656276
-
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard
-
Bao, F., Li, H., Wang, G., Eds.; Springer: Berlin/Heidelberg, Germany
-
Zhang, W.; Wu, W.; Feng, D.; Su, B. Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. In Information Security Practice and Experience; Bao, F., Li, H., Wang, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5451, pp. 324–335.
-
(2009)
Information Security Practice and Experience
, vol.5451
, pp. 324-335
-
-
Zhang, W.1
Wu, W.2
Feng, D.3
Su, B.4
-
33
-
-
79951469766
-
Security of the SMS4 Block Cipher against Differential Cryptanalysis
-
Su, B.-Z.; Wu, W.-L.; Zhang, W.-T. Security of the SMS4 Block Cipher against Differential Cryptanalysis. J. Comput. Sci. Technol. 2011, 26, 130–138.
-
(2011)
J. Comput. Sci. Technol
, vol.26
, pp. 130-138
-
-
Su, B.-Z.1
Wu, W.-L.2
Zhang, W.-T.3
-
34
-
-
57049089457
-
Analysis of Two Attacks on Reduced-Round Versions of the SMS 4
-
Chen, L., Ryan, M., Wang, G., Eds.; Springer: Berlin/Heidelberg, Germany
-
Toz, D.; Dunkelman, O. Analysis of Two Attacks on Reduced-Round Versions of the SMS 4. In Information and Communications Security; Chen, L., Ryan, M., Wang, G., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5308, pp. 141–156.
-
(2008)
Information and Communications Security
, vol.5308
, pp. 141-156
-
-
Toz, D.1
Dunkelman, O.2
-
35
-
-
71549127114
-
An Analysis of the Compact XSL Attack on BES and Embedded SMS 4
-
Garay, J., Miyaji, A., Otsuka, A., Eds.; Springer: Berlin/Heidelberg, Germany
-
Choy, J.; Yap, H.; Khoo, K. An Analysis of the Compact XSL Attack on BES and Embedded SMS 4. In Cryptology and Network Security; Garay, J., Miyaji, A., Otsuka, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5888, pp. 103–118.
-
(2009)
Cryptology and Network Security
, vol.5888
, pp. 103-118
-
-
Choy, J.1
Yap, H.2
Khoo, K.3
-
36
-
-
77954596505
-
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared
-
Lee, D., Hong, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2010
-
Erickson, J.; Ding, J.; Christensen, C. Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. In Information, Security and Cryptology—ICISC 2009; Lee, D., Hong, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 5984, pp. 73–86.
-
(2009)
In Information, Security and Cryptology—ICISC
, vol.5984
, pp. 73-86
-
-
Erickson, J.1
Ding, J.2
Christensen, C.3
-
37
-
-
84951781404
-
-
(accessed on 12 May 2015)
-
Wyseur, B. White-Box Cryptography. Available online: http://summerschool08.iaik.tugraz.at/ slides/Brecht_wbc1_crete_final.pdf (accessed on 12 May 2015).
-
White-Box Cryptography
-
-
Wyseur, B.1
-
38
-
-
58549119337
-
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin
-
Li, W.; Gu, D.; Wang, Y. Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin. J. Syst. Softw. 2009, 82, 346–354.
-
(2009)
J. Syst. Softw
, vol.82
, pp. 346-354
-
-
Li, W.1
Gu, D.2
Wang, Y.3
-
39
-
-
84930616345
-
Cache timing attack on SMS 4
-
Zhao, X.-J.; Wang, T.; Zheng, Y.-Y. Cache timing attack on SMS 4. J. Commun. 2010, 6, 016.
-
(2010)
J. Commun
, vol.6
, pp. 016
-
-
Zhao, X.-J.1
Wang, T.2
Zheng, Y.-Y.3
-
40
-
-
84900566834
-
A Power Analysis on SMS4 Using the Chosen Plaintext Method
-
Leshan, China, 14–15 December
-
Wang, S.; Gu, D.; Liu, J.; Guo, Z.; Wang, W.; Bao, S. A Power Analysis on SMS4 Using the Chosen Plaintext Method. In Proceedings of the 2013 9th International Conference on Computational Intelligence and Security (CIS), Leshan, China, 14–15 December 2013; pp. 748–752.
-
(2013)
In Proceedings of the 2013 9Th International Conference on Computational Intelligence and Security (CIS)
, pp. 748-752
-
-
Wang, S.1
Gu, D.2
Liu, J.3
Guo, Z.4
Wang, W.5
Bao, S.6
|