1 |
S. K. Lee and Y. S. Kang, "Principles and Statistical Analysis of White Box Ciphers," IITP Weekly ICT Trends, vol. 1977, pp. 15-25, Dec. 2020.
|
2 |
Y. Xiao and X. Lai, "A Secure Implementation of White-Box AES," in Proceedings of 2009 2nd International Conference on Computer Science and its Applications, Jeju, Korea, pp. 1-6, 2009.
|
3 |
S. Lee, T. Kim, and Y. Kang, "A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis," IEEE Transactions on Information Forensics and Security, vol. 13, no. 10, pp. 2602-2615, Oct. 2018.
DOI
|
4 |
S. -V. Ghita, V. -V. Patriciu, and I. Bica, "A new DRM architecture based on mobilel code and white-box encryption," in Proceedings of 2012 9th International Conference on Communications, Bucharest, Romania, pp. 303-306, 2012.
|
5 |
Y. C. Lee, S. H. Jin, H. V. Kim, H. S. Kim, and S. H. Hong, "New Higher-Order Differential Computation Analysis on Masked White-Box AES," Journal of The Korea Institute of Information Security and Cryptology, vol. 30, no. 1, pp. 1-15, Feb. 2020.
DOI
|
6 |
D. G. V. Albricci, M. Ceria, F. Cioschi, N. Fornari, A. Shakiba, and A. Visconti, "Measuring Performances of a White-Box Approach in the IoT Context," Symmetry, vol. 11, no. 8, pp. 1-19, Aug. 2019.
|
7 |
Y. Shi, W. Wei, H. Fan, M. H. Au, and X. Luo, "A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices," IEEE Transactions on Computers, vol. 68, no. 10, pp. 1411-1427, Oct. 2011.
|
8 |
doegox. Deadpool [Internet]. Available: https://github.com/SideChannelMarvels/Deadpool.
|
9 |
S. M. Cho, and S. H. Seo, "Current status of cryptographic technology applied to drone security," Review of Korea Institute of Information Security and Cryptology, vol.30, no. 2, pp.11-19. Apr. 2020.
|
10 |
S. Chow, P. Eisen, H. Johnson, and P. C. V. Oorschot, "White-Box Cryptography and an AES Implementation," in Proceedings of International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, pp. 250-270, 2003.
|
11 |
S. H. Kim, Y. K Lee, and B. H. Chung, "Analysis on Trends for White-Box Cryptography and Its Application Technology," Electronics and Telecommunications Trends, vol. 25, no. 5, pp. 137-146, Oct. 2010.
DOI
|
12 |
K. Kapusta, G. Memmi, and H. Noura, "Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks," Annals of Telecommunications, vol. 74, no. 3-4, pp. 157-165, Apr. 2019.
DOI
|
13 |
L. Zhou, C. Su, Y. Wen, W. Li, and Z. Gong, "Towards practical white-box lightweight block cipher implementations for IoTs," Future Generation Computer Systems, vol. 86, no. 507-514, Sep. 2018.
|
14 |
A. Saha and C. Srinivasan, "White-Box cryptography based data encryption-decryption scheme for IoT environment," in Proceedings of 2019 5th International Conference on Advanced Computing &Communication Systems, Coimbatore, India, pp. 637-641, 2019.
|
15 |
D. H. Choi and C. K. Hong, "A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment," Journal of Convergence for Information Technology, vol. 9, no. 10, pp. 9-15, Oct. 2019.
DOI
|