[1] |
CHOW S , EISEN P A , JOHNSON H ,et al. White-box cryptography and an AES implementation[C]// Selected Areas in Cryptography. Berlin:Springer, 2003: 250-270.
|
[2] |
CHOW S , EISEN P , JOHNSON H ,et al. A white-box DES implementation for DRM applications[C]// ACM Workshop on Digital Rights Management. New York:ACM Press, 2003: 1-5.
|
[3] |
JACOB M , BONEH D , FELTEN E . Attacking an obfuscated cipher by injecting faults[C]// Digital Rights Management. Berlin:Springer, 2003: 16-31.
|
[4] |
GOUBIN L , MASEREEL J M , QUISQUATER M . Cryptanalysis of white box DES implementations[J]. Lecture Notes in Computer Science, 2007,4876: 278-295.
|
[5] |
BILLET O , GILBERT H , ECH-CHATBI C . Cryptanalysis of a white box AES implementation[C]// Selected Areas in Cryptography. Berlin:Springer, 2005: 227-240.
|
[6] |
XIAO Y , LAI X . A secure implementation of white-box aes[C]// The 2nd International Conference on Computer Science and Its Applications. Piscataway:IEEE Press, 2009: 1-6.
|
[7] |
MULDER DE Y , ROELSE P , PRENEEL B . Cryptanalysis of the Xiao-Lai white-box AES implementation[C]// Selected Areas in Cryptography. Berlin:Springer, 2013: 34-49.
|
[8] |
LUO R , LAI X J , YOU R . A new attempt of white-box AES implementation[C]// 2014 International Conference on Security,Pattern Analysis,and Cybernetics. Piscataway:IEEE Press, 2014: 423-429.
|
[9] |
KARROUMI M , . Protecting white-box AES with dual ciphers[C]// Information Security and Cryptology-ICISC 2010. Berlin:Springer, 2011: 278-291.
|
[10] |
MULDER DE Y . White-box cryptography:analysis of white-box AES implementations[D]. Belgium:KU Leuven, 2014.
|
[11] |
BIRYUKOV A , BOUILLAGUET C , KHOVRATOVICH D . Cryptographic schemes based on the ASASA structure:black-box,white-box,and public-key[C]// Advances in Cryptology—ASIACRYPT 2014. Berlin:Springer, 2014: 63-84.
|
[12] |
BOGDANOV A , ISOBE T . White-box cryptography revisited:space-hard ciphers[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2015: 1058-1069.
|
[13] |
KARROUMI M , . Protecting white-box AES with dual ciphers[C]// Proceedings of the 13th International Conference on Information Security and Cryptology. Berlin:Springer, 2011: 278-291.
|
[14] |
XU T , LIU F , WU C . A white-box AES-like implementation based on key-dependent substitution-linear transformations[J]. Multimedia Tools and Applications, 2018,77(14): 18117-18137.
|
[15] |
姚思, 陈杰 . SM4 算法的一种新型白盒实现[J]. 密码学报, 2020,7(3): 358-374.
|
|
YAO S , CHEN J . A new method for white-box implementation of SM4 algorithm[J]. Journal of Cryptologic Research, 2020,7(3): 358-374.
|
[16] |
FUKUSHIMA K , HIDANO S , KIYOMOTO S . White-box implementation of stream cipher[C]// The 3rd International Conference on Information Systems Security and Privacy.[S.n.:s.l.], 2017: 263-269.
|
[17] |
BAI K , WU C . A secure white-box SM4 implementation[J]. Security and Communications Networks, 2016,9(10): 996-1006.
|
[18] |
BAI K P , WU C K , ZHANG Z F . Protect white-box AES to resist table composition attacks[J]. IET Information Security, 2018,12(4): 305-313.
|
[19] |
BIRYUKOV A , CANNIERE DE C , BRAEKEN A ,et al. A toolbox for cryptanalysis:linear and affine equivalence algorithms[C]// Advances in Cryptology-EUROCRYPT 2003. Berlin:Springer, 2003: 33-50.
|