1 |
On the disign of S-boxes
/
[
A.F.Webster;S.E.Tavares
] /
CRYPTO'85
|
2 |
/
[
O.Goldreich;R.Ostrovsky
] /
Software protection and simulation on oblivious RAMs(Revised)
|
3 |
A software protection scheme
/
[
G.B.Purdy;G.J.Simmons;J.A.Studier
] /
In Proc.1982 Symp.Security and Privacy
|
4 |
Design of Extended DES cryptography
/
[
S.J.Han;H.S.Oh
] /
Proceeding of the IEEE International Sympsium on Information Theory
|
5 |
Improved-DES Cryptosystem Design
/
[
S.J.Han
] /
Journal of Kiss
|
6 |
Structured Design of Substitution Permutation Encryption Networks
/
[
J.B.Kam;G.I.Davida
] /
IEEE Trans.on Comput
DOI
ScienceOn
|
7 |
Computer systems to inhibit unauthorized copying, unauthorized software
/
[
M.G.Arnold;Mark D.Winkel
] /
U.S.Patent No.4,558,176
|
8 |
On software protection
/
[
A.Herzberg;G.Karmi
] /
In Proc. Fourth JCIT
|
9 |
Design concepts for tamper responding system
/
[
D.Chaumm;D.Chaum(ed)
] /
In Advances in Cryptology:Proc. Crypto 83
|
10 |
The Improvement Data Encryption Standard(DES) Algorithm
/
[
S.J.Han
] /
Proceedings of ISSSTA '96,IEEE
|
11 |
Tamper resistant software
/
[
David Aucsmith
] /
Information Hiding-Proceedings of the First International Workshop
|
12 |
How disks are padlocked
/
[
J.Voelker;P.Walich
] /
IEEE Spectrum
|
13 |
Public protection of software
/
[
A.Herzberg;S.S.Pinter;H.C.Williams(ed)
] /
In Advances in Cryptology, Proc Crypto 85
|