共 33 条
[21]
Joye M., 2009, Cryptographic Engineering, P365
[22]
Joye M., 2008, Security of Information and Networks, P7
[23]
Karroumi M, 2011, LECT NOTES COMPUT SC, V6829, P278
[24]
Lepoint T., 2013, LNCS
[25]
Clarifying obfuscation: Improving the security of white-box DES
[J].
ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1,
2005,
:679-684
[26]
Michiels W, 2009, LECT NOTES COMPUT SC, V5381, P414, DOI 10.1007/978-3-642-04159-4_27
[27]
Naor D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P41
[28]
Paillier P, 2005, LECT NOTES COMPUT SC, V3788, P1
[29]
Preneel B., 2005, P 26 S INF THEOR BEN, P296
[30]
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017