共 30 条
[11]
Chow Stanley, Eisen Philip A., Johnson Harold, van Oorschot Paul C., A white-box DES implementation for DRM applications, Digital Rights Management Workshop, volume 2696 of Lecture Notes in Computer Science, pp. 1-15, (2002)
[12]
De Mulder Yoni, Roelse Peter, Preneel Bart, Cryptanalysis of the Xiao-Lai white-box AES implementation, SAC 2012, volume 7707 of LNCS, pp. 34-49, (2013)
[13]
Esser Andre, Kubler Robert, May Alexander, LPN decoded, CRYPTO 2017, Part II, volume 10402 of LNCS, pp. 486-514, (2017)
[14]
Unified matrix treatment of the fast Walsh-Hadamard transform, IEEE Transactions on Computers, C-25, 11, pp. 1142-1146, (1976)
[15]
Goubin Louis, Paillier Pascal, Rivain Matthieu, Wang Junwei, How to reveal the secrets of an obscure white-box implementation, Journal of Cryptographic Engineering, 10, 1, pp. 49-66, (2020)
[16]
Goubin Louis, Rivain Matthieu, Wang Junwei, Defeating state-of-the-art white-box countermeasures, IACR TCHES, 2020, 3, pp. 454-482, (2020)
[17]
Herbst Christoph, Oswald Elisabeth, Mangard Stefan, An AES smart card implementation resistant to power analysis attacks, ACNS 06, volume 3989 of LNCS, pp. 239-252, (2006)
[18]
Ishai Yuval, Sahai Amit, Wagner David, Private circuits: Securing hardware against probing attacks, CRYPTO 2003, volume 2729 of LNCS, pp. 463-481, (2003)
[19]
Karroumi Mohamed, Protecting white-box AES with dual ciphers, Information Security and Cryptology-ICISC 2010, pp. 278-291, (2011)
[20]
Kocher Paul C., Jaffe Joshua, Jun Benjamin, Differential power analysis, CRYPTO’99, volume 1666 of LNCS, pp. 388-397, (1999)