共 50 条
- [41] On the security goals of white-box cryptography [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 327 - 357
- [42] White-box Implementation and Analysis of SIMON [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278
- [43] On the Linear Transformation in White-Box Cryptography [J]. IEEE ACCESS, 2020, 8 : 51684 - 51691
- [44] Efficient and Provable White-Box Primitives [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 159 - 188
- [45] White-box Implementation of Stream Cipher [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
- [46] White-Box AES Implementation Revisited [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
- [47] A New White-box Cryptographic Scheme [J]. 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION SYSTEM (SEIS 2015), 2015, : 373 - 378
- [48] Attacking White-Box AES Constructions [J]. SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION, 2016, : 85 - 90
- [49] White-box attack context cryptovirology [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (04): : 321 - 334
- [50] Towards a Theory of White-Box Security [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 342 - 352