共 50 条
[33]
Another Look on Bucketing Attack to Defeat White-Box Implementations
[J].
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019),
2019, 11421
:99-117
[35]
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016,
2016, 9813
:215-236
[36]
LPN-based Attacks in the White-box Setting
[J].
IACR Transactions on Cryptographic Hardware and Embedded Systems,
2023, 2023 (04)
:318-343
[37]
Cryptanalysis of ARX-based White-box Implementations
[J].
IACR Transactions on Cryptographic Hardware and Embedded Systems,
2023, 2023 (03)
:97-135
[39]
Measuring Performances of a White-Box Approach in the IoT Context
[J].
SYMMETRY-BASEL,
2019, 11 (08)
[40]
Attacking White-Box AES Constructions
[J].
SPRO'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON SOFTWARE PROTECTION,
2016,
:85-90