共 50 条
[21]
How to reveal the secrets of an obscure white-box implementation
[J].
Journal of Cryptographic Engineering,
2020, 10
:49-66
[22]
Study on White-Box Cryptography: Key Whitening and Entropy Attacks
[J].
2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO),
2016,
:323-327
[23]
A White-Box Speck Implementation Using Self-equivalence Encodings
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022,
2022, 13269
:771-791
[24]
A white-box AES-like implementation based on key-dependent substitution-linear transformations
[J].
Multimedia Tools and Applications,
2018, 77
:18117-18137
[26]
White-box filtering attacks breaking SEL masking: from exponential to polynomial time
[J].
IACR Transactions on Cryptographic Hardware and Embedded Systems,
2024, 2024 (03)
:1-24
[27]
White-Box Cryptography: Don’t Forget About Grey-Box Attacks
[J].
Journal of Cryptology,
2019, 32
:1095-1143
[30]
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels -
[J].
FAST SOFTWARE ENCRYPTION (FSE 2016),
2016, 9783
:185-203