共 11 条
[1]
[Anonymous], 1883, J SCI MILITAIRES
[2]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[4]
Biryukov A., 2014, LNCS, V8873, P7
[5]
White-box Cryptography Revisited: Space-Hard Ciphers
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1058-1069
[6]
Chow S, 2003, LECT NOTES COMPUT SC, V2595, P250
[7]
Daemen J., 2003, AES proposal: Rijndael, AES algorithm submission
[8]
Delerablee C., 2013, LNCS, P247, DOI DOI 10.1007/978-3-662-43414-713
[9]
Karroumi Mohamed, 2010, Information Security and Cryptology - ICISC 2010. 13th International Conference. Revised Selected Papers, P278, DOI 10.1007/978-3-642-24209-0_19
[10]
Lepoint T., 2003, LNCS, V8282, P265