-
1
-
-
84942924995
-
Design and deployment of an iot application-oriented testbed
-
Belli, L., Cirani, S., Davoli, L., Gorrieri, A., Mancin, M., Picone, M., and Ferrari, G., 2015. Design and deployment of an iot application-oriented testbed. Computer 48, 9, 32-40.
-
(2015)
Computer
, vol.48
, Issue.9
, pp. 32-40
-
-
Belli, L.1
Cirani, S.2
Davoli, L.3
Gorrieri, A.4
Mancin, M.5
Picone, M.6
Ferrari, G.7
-
2
-
-
38148998967
-
Cryptanalysis of patarin's 2-round public key system with s boxes (2r)
-
2000/01/01 2000, Springer Berlin Heidelberg
-
Biham, E., 2000. Cryptanalysis of patarin's 2-round public key system with s boxes (2r). In Proceedings of the Advances in Cryptology - EUROCRYPT 2000 2000/01/01 2000, Springer Berlin Heidelberg, 408-416.
-
(2000)
Proceedings of the Advances in Cryptology - EUROCRYPT 2000
, pp. 408-416
-
-
Biham, E.1
-
3
-
-
35048833291
-
Cryptanalysis of a white box aes implementation
-
2005/01/01 2005, Springer Berlin Heidelberg
-
Billet, O., Gilbert, H., and Ech-Chatbi, C, 2005. Cryptanalysis of a white box aes implementation. In Proceedings of the Selected Areas in Cryptography 2005/01/01 2005, Springer Berlin Heidelberg, 227-240.
-
(2005)
Proceedings of the Selected Areas in Cryptography
, pp. 227-240
-
-
Billet, O.1
Gilbert, H.2
Ech-Chatbi, C.3
-
4
-
-
84916624473
-
Cryptographic schemes based on the asasa structure: Black-box, white-box, and public-key
-
2014/01/01 2014, Springer Berlin Heidelberg
-
Biryukov, A., Bouillaguet, C, and Khovratovich, D., 2014. Cryptographic schemes based on the asasa structure: black-box, white-box, and public-key In Proceedings of the Advances in Cryptology - ASIACRYPT 2014 2014/01/01 2014, Springer Berlin Heidelberg, 63-84.
-
(2014)
Proceedings of the Advances in Cryptology - ASIACRYPT 2014
, pp. 63-84
-
-
Biryukov, A.1
Bouillaguet, C.2
Khovratovich, D.3
-
6
-
-
84961573666
-
Cryptanalysis of feistel networks with secret round functions
-
Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers 2015, Springer International Publishing
-
Biryukov, A., Leurent, G., and Perrin, L., 2015. Cryptanalysis of feistel networks with secret round functions. In Proceedings of the Selected Areas in Cryptography-SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers 2015, Springer International Publishing.
-
(2015)
Proceedings of the Selected Areas in Cryptography-SAC 2015, 21st International Conference
-
-
Biryukov, A.1
Leurent, G.2
Perrin, L.3
-
7
-
-
84943592011
-
On reverse-engineering s-boxes with hidden design criteria or structure
-
2015/01/01 2015, Springer Berlin Heidelberg
-
Biryukov, A. and Perrin, L.,2015. On reverse-engineering s-boxes with hidden design criteria or structure. In Proceedings of the Advances in Cryptology - CRYPTO 2015 2015/01/01 2015, Springer Berlin Heidelberg, 116-140.
-
(2015)
Proceedings of the Advances in Cryptology - CRYPTO 2015
, pp. 116-140
-
-
Biryukov, A.1
Perrin, L.2
-
8
-
-
77956748277
-
Structural cryptanalysis ofsasas
-
(2010/10/01)
-
Biryukov, A. and Shamir, A., 2010. Structural cryptanalysis ofsasas. Journal of Cryptology 23, 4 (2010/10/01), 505-518.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.4
, pp. 505-518
-
-
Biryukov, A.1
Shamir, A.2
-
9
-
-
84954108497
-
White-box cryptography revisited: Space-hard ciphers
-
ACM, 2813699
-
Bogdanov, A. and Isobe, T., 2015. White-box cryptography revisited: Space-hard ciphers. In Proceedings of the Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015, ACM, 2813699, 1058-1069.
-
(2015)
Proceedings of the Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
, pp. 1058-1069
-
-
Bogdanov, A.1
Isobe, T.2
-
10
-
-
84981316101
-
Differential computation analysis: Hiding your white-box designs is not enough
-
2016, Springer
-
Bos, J.W., Hubain, C, Michiels, W., and Teuwen, P., 2016. Differential computation analysis: Hiding your white-box designs is not enough. In Proceedings of the Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016)2016, Springer.
-
(2016)
Proceedings of the Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016)
-
-
Bos, J.W.1
Hubain, C.2
Michiels, W.3
Teuwen, P.4
-
11
-
-
38549149185
-
-
In 2007
-
Brecht, W., Wil, M., Paul, G., and Bart, P., 2007. Cryptanalysis of white-box des implementations with arbitrary external encodings. In 2007, 264-277.
-
(2007)
Cryptanalysis of White-box des Implementations with Arbitrary External Encodings
, pp. 264-277
-
-
Brecht, W.1
Wil, M.2
Paul, G.3
Bart, P.4
-
13
-
-
35248853376
-
A white-box des implementation for drm applications
-
Springer
-
Chow, S., Eisen, P., Johnson, H, and Van Oorschot, P.C., 2003. A white-box des implementation for drm applications. In Proceedings of the Digital Rights Management 2003, Springer, 1-15.
-
(2003)
Proceedings of the Digital Rights Management 2003
, pp. 1-15
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.C.4
-
14
-
-
21144457759
-
White-box cryptography and an aes implementation
-
Chow, S., Eisen, P., Johnson, H, and Van Orschot, P.C., 2003. White-box cryptography and an aes implementation. In Proceedings of the Selected Areas in Cryptography 2003, 250-270.
-
(2003)
Proceedings of the Selected Areas in Cryptography 2003
, pp. 250-270
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Orschot, P.C.4
-
15
-
-
84872510835
-
Cryptanalysis of the xiao - Lai white-box aes implementation
-
2013/01/01 2013, Springer Berlin Heidelberg
-
De Mulder, Y., Roelse, P., and Preneel, B., 2013. Cryptanalysis of the xiao - lai white-box aes implementation. In Proceedings of the Selected Areas in Cryptography 2013/01/01 2013, Springer Berlin Heidelberg, 34-49.
-
(2013)
Proceedings of the Selected Areas in Cryptography
, pp. 34-49
-
-
De Mulder, Y.1
Roelse, P.2
Preneel, B.3
-
16
-
-
78651087690
-
Cryptanalysis of a perturbated white-box aes implementation
-
20102010, Springer
-
De Mulder, Y., Wyseur, B., and Preneel, B., 2010. Cryptanalysis of a perturbated white-box aes implementation. In Proceedings of the Progress in Cryptology-INDOCRYPT 20102010, Springer, 292-310.
-
(2010)
Proceedings of the Progress in Cryptology-INDOCRYPT
, pp. 292-310
-
-
De Mulder, Y.1
Wyseur, B.2
Preneel, B.3
-
17
-
-
85057991760
-
Building wearables for geology: An operating system approach
-
Delabrida, S., D'angelo, T., Oliveira, R.a.R., and Loureiro, A.a.F., 2016. Building wearables for geology: An operating system approach.ACM SIGOPS Operating Systems Review 50, 1,31-45.
-
(2016)
ACM SIGOPS Operating Systems Review
, vol.50
, Issue.1
, pp. 31-45
-
-
Delabrida, S.1
D'Angelo, T.2
Oliveira, R.A.R.3
Loureiro, A.A.F.4
-
18
-
-
84902603144
-
White-box security notions for symmetric encryption schemes
-
Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers 2014, Springer Berlin Heidelberg
-
Delerablee, C, Lepoint, T., Paillier, P., and Rivain, M., 2014. White-box security notions for symmetric encryption schemes. In Proceedings of the Selected Areas in Cryptography - SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers 2014, Springer Berlin Heidelberg, 247-264.
-
(2014)
Proceedings of the Selected Areas in Cryptography - SAC 2013: 20th International Conference
, pp. 247-264
-
-
Delerablee, C.1
Lepoint, T.2
Paillier, P.3
Rivain, M.4
-
20
-
-
77956610822
-
Tampering in RFID: A survey on risks and defenses
-
Gandino, F., Montrucchio, B., and Rebaudengo, M., 2010. Tampering in rfid: A survey on risks and defenses. Mobile Networks and Applications 15, 4, 502-516.
-
(2010)
Mobile Networks and Applications
, vol.15
, Issue.4
, pp. 502-516
-
-
Gandino, F.1
Montrucchio, B.2
Rebaudengo, M.3
-
21
-
-
85031289618
-
Key-recovery attack on the asasa cryptosystem with expanding s-boxes
-
Gilbert;, H., Plut;, J., and Treger, J., 2015. Key-recovery attack on the asasa cryptosystem with expanding s-boxes In Proceedings of the Advances in Cryptology - CRYPTO 20752015.
-
(2015)
Proceedings of the Advances in Cryptology - CRYPTO
, pp. 20752015
-
-
Gilbert, H.1
Plut, J.2
Treger, J.3
-
22
-
-
38549140489
-
Cryptanalysis of white box des implementations
-
Goubin, L., Masereel, J.-M., and Quisquater, M., 2007. Cryptanalysis of white box des implementations. In Proceedings of the Selected Areas in Cryptography 2007, 278-295.
-
(2007)
Proceedings of the Selected Areas in Cryptography 2007
, pp. 278-295
-
-
Goubin, L.1
Masereel, J.-M.2
Quisquater, M.3
-
23
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
G. VIGNA Ed. Springer Berlin Heidelberg
-
Hohl, F., 1998. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile agents and security, G. VIGNA Ed. Springer Berlin Heidelberg, 92-113.
-
(1998)
Mobile Agents and Security
, pp. 92-113
-
-
Hohl, F.1
-
24
-
-
35248830740
-
Attacking an obfuscated cipher by injecting faults
-
Springer
-
Jacob, M., Boneh, D., and Felten, E., 2003. Attacking an obfuscated cipher by injecting faults. In Proceedings of the Digital Rights Management 2003, Springer, 16-31.
-
(2003)
Proceedings of the Digital Rights Management 2003
, pp. 16-31
-
-
Jacob, M.1
Boneh, D.2
Felten, E.3
-
25
-
-
24144444705
-
Fox : A new family of block ciphers
-
Waterloo, Canada, August 9-10, 2004, Revised Selected Papers 2005, Springer Berlin Heidelberg
-
Junod, P. and Vaudenay, S., 2005. Fox : A new family of block ciphers. In Proceedings of the Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers 2005, Springer Berlin Heidelberg, 114-129.
-
(2005)
Proceedings of the Selected Areas in Cryptography: 11th International Workshop, SAC 2004
, pp. 114-129
-
-
Junod, P.1
Vaudenay, S.2
-
27
-
-
84904107418
-
Sweet dreams and nightmares: Security in the internet of things
-
D. NACCACHE and D. SAUVERON Eds. Springer-Verlag Berlin, Berlin
-
Kasper, T., Oswald, D., and Paar, C, 2014. Sweet dreams and nightmares: Security in the internet of things. In Information Security Theory and Practice: Securing the Internet of Things, D. NACCACHE and D. SAUVERON Eds. Springer-Verlag Berlin, Berlin, 1-9.
-
(2014)
Information Security Theory and Practice: Securing the Internet of Things
, pp. 1-9
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
28
-
-
84922876788
-
Social access vs. Privacy in wearable computing: A case study of autism
-
Kirkham, R. and Greenhalgh, C, 2015. Social access vs. Privacy in wearable computing: A case study of autism. Pervasive Computing, IEEE 14, 1, 26-33.
-
(2015)
Pervasive Computing, IEEE
, vol.14
, Issue.1
, pp. 26-33
-
-
Kirkham, R.1
Greenhalgh, C.2
-
29
-
-
84914146104
-
Benchmarking internet of things devices
-
Ieee
-
Kruge, CP., Hancke, G.P., and Iannella, R., 2014. Benchmarking internet of things devices, In Proceedings of the 2014 12th Ieee International Conference on Industrial 1nformatics 2014, Ieee, 611-616.
-
(2014)
Proceedings of the 2014 12th Ieee International Conference on Industrial 1nformatics 2014
, pp. 611-616
-
-
Kruge, C.P.1
Hancke, G.P.2
Iannella, R.3
-
30
-
-
85011105685
-
A proposal for a new block encryption standard
-
Denmark, may 21-24, 1990 proceedings, LB. DAMG RD Ed. Springer Berlin Heidelberg, Berlin, Heidelberg
-
Lai, X. and Massey, J.L., 1991. A proposal for a new block encryption standard. In Advances in cryptology - eurocrypt '90: Workshop on the theory and application of cryptographic techniques aarhus, denmark, may 21-24, 1990 proceedings, LB. DAMG RD Ed. Springer Berlin Heidelberg, Berlin, Heidelberg, 389-404.
-
(1991)
Advances in Cryptology - Eurocrypt '90: Workshop on the Theory and Application of Cryptographic Techniques Aarhus
, pp. 389-404
-
-
Lai, X.1
Massey, J.L.2
-
31
-
-
84902603143
-
Two attacks on a white-box aes implementation
-
2014/01/01 2014, Springer Berlin Heidelberg
-
Lepoint, T., Rivain, M., De Mulder, Y., Roelse, P., and Preneel, B., 2014. Two attacks on a white-box aes implementation, In Proceedings of the Selected Areas in Cryptography - SAC 2013 2014/01/01 2014, Springer Berlin Heidelberg, 265-285.
-
(2014)
Proceedings of the Selected Areas in Cryptography - SAC 2013
, pp. 265-285
-
-
Lepoint, T.1
Rivain, M.2
De Mulder, Y.3
Roelse, P.4
Preneel, B.5
-
32
-
-
85031311460
-
A low-cost node capture attack algorithm for wireless sensor networks
-
n/a-n/a
-
Lin, C, Wu, G., Qiu, T., and Deng, J., 2015. A low-cost node capture attack algorithm for wireless sensor networks. International Journal of Communication Systems, n/a-n/a.
-
(2015)
International Journal of Communication Systems
-
-
Lin, C.1
Wu, G.2
Qiu, T.3
Deng, J.4
-
34
-
-
85031281864
-
-
Mcintosh, S., Brand, D., Kaplan, M., Karger, PA., Mcintosh, M.G., Palmer, E.R., Paradkar, A.M., Toll, D., and Weber, S.M., 2010. Method and system for hardware based program flow monitor for embedded software Google Patents.
-
(2010)
Method and System for Hardware Based Program Flow Monitor for Embedded Software Google Patents
-
-
Mcintosh, S.1
Brand, D.2
Kaplan, M.3
Karger, P.A.4
Mcintosh, M.G.5
Palmer, E.R.6
Paradkar, A.M.7
Toll, D.8
Weber, S.M.9
-
35
-
-
84904263520
-
Survey on vanet security challenges and possible cryptographic solutions
-
Mejri, M.N., Ben-Othman, J., and Hamdi, M., 2014. Survey on vanet security challenges and possible cryptographic solutions. Vehicular Communications 1, 2 (4//), 53-66.
-
(2014)
Vehicular Communications
, vol.1-2
, Issue.4
, pp. 53-66
-
-
Mejri, M.N.1
Ben-Othman, J.2
Hamdi, M.3
-
36
-
-
70350677133
-
Cryptanalysis of a generic class of white-box implementations
-
Michiels, W., Gorissen, P., and Hollmann, H.D.L., 2008. Cryptanalysis of a generic class of white-box implementations. In Proceedings of the Selected Areas in Cryptography 2008, 414-428.
-
(2008)
Proceedings of the Selected Areas in Cryptography 2008
, pp. 414-428
-
-
Michiels, W.1
Gorissen, P.2
Hollmann, H.D.L.3
-
37
-
-
84952659928
-
Key-recovery attacks on asasa
-
Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part 112015, Springer Berlin Heidelberg
-
Minaud, B., Derbez, P., Fouque, P.-A., and Karpman, P., 2015. Key-recovery attacks on asasa. In Proceedings of the Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part 112015, Springer Berlin Heidelberg, 3-27.
-
(2015)
Proceedings of the Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security
, pp. 3-27
-
-
Minaud, B.1
Derbez, P.2
Fouque, P.-A.3
Karpman, P.4
-
39
-
-
84907912876
-
Node-capture resilient key establishment in sensor networks: Design space and new protocols
-
Newell, A., Yao, H, Ryker, A., Ho, T., and Nita-Rotaru, C, 2014. Node-capture resilient key establishment in sensor networks: Design space and new protocols.ACM Comput. Surv. 47,2, 1-34.
-
(2014)
ACM Comput. Surv.
, vol.47
, Issue.2
, pp. 1-34
-
-
Newell, A.1
Yao, H.2
Ryker, A.3
Ho, T.4
Nita-Rotaru, C.5
-
40
-
-
84946837966
-
Generic attacks on feistel schemes
-
2001/01/01 2001, Springer Berlin Heidelberg
-
Patarin, J., 2001. Generic attacks on feistel schemes. In Proceedings of the Advances in Cryptology - AS/ACRYPT 2001 2001/01/01 2001, Springer Berlin Heidelberg, 222-238.
-
(2001)
Proceedings of the Advances in Cryptology - AS/ACRYPT 2001
, pp. 222-238
-
-
Patarin, J.1
-
41
-
-
0010537086
-
Asymmetric cryptography with s-boxes is it easier than expected to design efficient asymmetric cryptosystems?
-
Patarin, J. and Goubin, L., 1997. Asymmetric cryptography with s-boxes is it easier than expected to design efficient asymmetric cryptosystems? In Proceedings of the Information and Communications Security 1991, 369-380.
-
(1997)
Proceedings of the Information and Communications Security 1991
, pp. 369-380
-
-
Patarin, J.1
Goubin, L.2
-
42
-
-
85132926942
-
Security and privacy in vehicular ad-hoc networks: Survey and the road ahead
-
S. KHAN and A.-S. KHAN PATHAN Eds. Springer Berlin Heidelberg
-
Razzaque, M.A., S, A., and Cheraghi, S., 2013. Security and privacy in vehicular ad-hoc networks: Survey and the road ahead. In Wireless networks and security, S. KHAN and A.-S. KHAN PATHAN Eds. Springer Berlin Heidelberg, 107-132.
-
(2013)
Wireless Networks and Security
, pp. 107-132
-
-
Razzaque, M.A.1
Cheraghi, S.2
-
43
-
-
84954315402
-
How close are we to realizing a pragmatic vanet solution? A meta-survey
-
Saini, M., Alelaiwi, A., and Saddik, A.E., 2015. How close are we to realizing a pragmatic vanet solution? A meta-survey.ACM Comput. Surv. 48, 2, 1-40.
-
(2015)
ACM Comput. Surv.
, vol.48
, Issue.2
, pp. 1-40
-
-
Saini, M.1
Alelaiwi, A.2
Saddik, A.E.3
-
44
-
-
84915781708
-
Low-cost alternatives for urban noise nuisance monitoring using wireless sensor networks
-
(Feb)
-
Segura-Garcia, J., Felici-Castell, S., Perez-Solano, J.J., Cobos, M., and Navarro, J.M., 2015. Low-cost alternatives for urban noise nuisance monitoring using wireless sensor networks, Ieee Sensors Journal 15, 2 (Feb), 836-844.
-
(2015)
Ieee Sensors Journal
, vol.15
, Issue.2
, pp. 836-844
-
-
Segura-Garcia, J.1
Felici-Castell, S.2
Perez-Solano, J.J.3
Cobos, M.4
Navarro, J.M.5
-
46
-
-
84912099206
-
A lightweight white-box symmetric encryption algorithm against node capture for wsns
-
IEEE
-
Shi, Y. and He, Z.,2014.A lightweight white-box symmetric encryption algorithm against node capture for wsns. In Proceedings of the Wireless Communications and Networking Conference (WCNC), 2014 IEEE 2014, IEEE, 3058-3063.
-
(2014)
Proceedings of the Wireless Communications and Networking Conference (WCNC), 2014 IEEE 2014
, pp. 3058-3063
-
-
Shi, Y.1
He, Z.2
-
47
-
-
84890077179
-
A secure implementation of a symmetric encryption algorithm in white-box attack contexts
-
Shi, Y., Liu, Q., and Zhao, Q.P., 2013. A secure implementation of a symmetric encryption algorithm in white-box attack contexts. Journal of Applied Mathematics.
-
(2013)
Journal of Applied Mathematics
-
-
Shi, Y.1
Liu, Q.2
Zhao, Q.P.3
-
48
-
-
84930650129
-
A lightweight white-box symmetric encryption algorithm against node capture for wsns
-
Shi, Y., Wei, W., and He, Z., 2015. A lightweight white-box symmetric encryption algorithm against node capture for wsns. Sensors 15, 5, 11928.
-
(2015)
Sensors
, vol.15
, Issue.5
, pp. 11928
-
-
Shi, Y.1
Wei, W.2
He, Z.3
-
49
-
-
85029503707
-
Multiple protocol transport network gateway for iot systems
-
Shih, C.-S. and Wu, G.-F., 2016. Multiple protocol transport network gateway for iot systems.ACM S1GAPP Applied Computing Review 15, 4, 7-18.
-
(2016)
ACM S1GAPP Applied Computing Review
, vol.15
, Issue.4
, pp. 7-18
-
-
Shih, C.-S.1
Wu, G.-F.2
-
50
-
-
38149123507
-
The 128-bit blockcipher clefia
-
Springer Berlin Heidelberg
-
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., and Iwata, T., 2007. The 128-bit blockcipher clefia. In Proceedings of the Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers 2007, Springer Berlin Heidelberg, 181-195.
-
(2007)
Proceedings of the Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers 2007
, pp. 181-195
-
-
Shirai, T.1
Shibutani, K.2
Akishita, T.3
Moriai, S.4
Iwata, T.5
-
51
-
-
84904856750
-
Microcontrollers as (insecurity devices for pervasive computing applications
-
Strobel, D., Oswald, D., Richter, B., Schellenberg, F., and Paar, C, 2014. Microcontrollers as (insecurity devices for pervasive computing applications. Proceedings of the IEEE 102, 8, 1157-1173.
-
(2014)
Proceedings of the IEEE
, vol.102
, Issue.8
, pp. 1157-1173
-
-
Strobel, D.1
Oswald, D.2
Richter, B.3
Schellenberg, F.4
Paar, C.5
-
52
-
-
84912071950
-
A white-box clefia implementation for mobile devices
-
Institution of Engineering and Technology
-
Su, S., Dong, H, Fu, G., Zhang, C, and Zhang, M., 2014. A white-box clefia implementation for mobile devices. In 1ET Conference Proceedings Institution of Engineering and Technology, 27-27.
-
(2014)
1ET Conference Proceedings
, pp. 27
-
-
Su, S.1
Dong, H.2
Fu, G.3
Zhang, C.4
Zhang, M.5
-
53
-
-
84890062304
-
Improved cryptanalysis of an aes implementation
-
Boekelo, The Netherlands, May 24-25, 2012 WIC (Werkgemeenschap voor Inform.-en Communicatietheorie)
-
Tolhuizen, L., 2012. Improved cryptanalysis of an aes implementation. In Proceedings of the 33rd W1C Symposium on /nformation Theory in the Benelux, Boekelo, The Netherlands, May 24-25, 2012 WIC (Werkgemeenschap voor Inform.-en Communicatietheorie).
-
(2012)
Proceedings of the 33rd W1C Symposium on /Nformation Theory in the Benelux
-
-
Tolhuizen, L.1
-
54
-
-
84885349351
-
Efficient attack to white-box sms4 implementation
-
Tt, L. and Xj, L., 2013. Efficient attack to white-box sms4 implementation. Joumal of Software 24, 9, 2238-2249.
-
(2013)
Joumal of Software
, vol.24
, Issue.9
, pp. 2238-2249
-
-
Tt, L.1
Xj, L.2
-
55
-
-
21144439546
-
On the lai-massey scheme
-
Springer Berlin Heidelberg
-
Vaudenay, S., 1999. On the lai-massey scheme. In Proceedings of the Advances in Cryptology - AS/ACRYPT'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings 1999, Springer Berlin Heidelberg, 8-19.
-
(1999)
Proceedings of the Advances in Cryptology - AS/ACRYPT'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings 1999
, pp. 8-19
-
-
Vaudenay, S.1
-
56
-
-
80655124303
-
A secure implementation of white-box aes
-
IEEE
-
Xiao, Y. and Lai, X., 2009. A secure implementation of white-box aes. In Proceedings of the Computer Science and its Applications, 2009. CSA'09. 2nd International Conference on 2009, IEEE, 1-6.
-
(2009)
Proceedings of the Computer Science and Its Applications, 2009. CSA'09. 2nd International Conference on 2009
, pp. 1-6
-
-
Xiao, Y.1
Lai, X.2
-
57
-
-
84984964164
-
White-box cryptography and a white-box implementation of the sms4 algorithm
-
Xiao, Y. and Lai, X., 2009. White-box cryptography and a white-box implementation of the sms4 algorithm. In Proceedings of the Chaincrypto 2009 2009, 24-34.
-
(2009)
Proceedings of the Chaincrypto 2009
, vol.2009
, pp. 24-34
-
-
Xiao, Y.1
Lai, X.2
-
58
-
-
84934275692
-
Security in vehicular ad hoc networks (vanets)
-
Springer Berlin Heidelberg
-
Yang, W.,2013. Security in vehicular ad hoc networks (vanets). In Wireless network security Springer Berlin Heidelberg, 95-128.
-
(2013)
Wireless Network Security
, pp. 95-128
-
-
Yang, W.1
-
59
-
-
84861459260
-
Exact formulae for resilience in random key predistribution schemes
-
(May)
-
Yum, D.H. and Lee, P.J., 2012. Exact formulae for resilience in random key predistribution schemes, Ieee Transactions on Wireless Communications 11,5 (May), 1638-1642.
-
(2012)
Ieee Transactions on Wireless Communications
, vol.11
, Issue.5
, pp. 1638-1642
-
-
Yum, D.H.1
Lee, P.J.2
|