[1] |
CHOW S, EISEN P, JOHNSON H, et al. White-box Cryptography and an AES Implementation [C]//Lecture Notes in Computer Science: 2595. Heidelberg: Springer Verlag, 2003: 250-270.
|
[2] |
XU T, LIU F, WU C K. A White-box AES-like Implementation Based on Key-dependent Substitution-linear Transformations[J]. Multimedia Tools and Applications, 2018,77(14):18117-18137.
|
[3] |
XIAO Y Y, LAI X J. A Secure Implementation of White-box AES [C]//Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications. Washington: IEEE Computer Society, 2009: 5404239.
|
[4] |
BAI K P, WU C K. A Secure White-box SM4 Implementation[J]. Security and Communication Networks, 2016,9(10):996-1006.
|
[5] |
BRINGER J, CHABANN H, DOTTA E. White Box Cryptography: Another Attempt[J/OL]. [2019-12-12]. http://pdfs.semanticscholar.org/ffe2/6d8789b859ceb92a40779ffe60110da77161.pdf.
|
[6] |
KARROUMI M. Protecting White-box AES with Dual Ciphers [C]//Lecture Notes in Computer Science: 6829. Heidelberg: Springer Verlag, 2011: 278-291.
|
[7] |
BILLET O, GILBERT H, ECH-CHATBI C. Cryptanalysis of a White Box AES Implementation [C]//Lecture Notes in Computer Science: 3357. Heidelberg: Springer Verlag, 2005: 227-240.
|
[8] |
MICHIELS W, GORISSEN P, HOLLMANN H D L. Cryptanalysis of a Generic Class of White-Box Implementations [C]// Lecture Notes in Computer Science: 5381. Heidelberg: Springer Verlag, 2008: 414-428.
|
[9] |
MULDER Y D, ROELSE P, PRENEEL B. Cryptanalysis of the Xiao-Lai White-box AES Implementation [C]//Lecture Notes in Computer Science: 7707. Heidelberg: Springer Verlag, 2013: 34-49.
|
[10] |
BOGDANOV A, RIVAIN M, VEJRE P S, et al. Higher-Order DCA against Standard Side-Channel Countermeasures [C]//Lecture Notes in Computer Science: 11421. Heidelberg: Springer Verlag, 2019: 118-141.
|
[11] |
RIVAIN M, WANG J W. Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations[J] IACR Cryptology ePrint Archive, 2019,2019:225-255.
|
[12] |
SHI Y, WEI W, FAN H, et al. A Light-weight White-box Encryption Scheme for Securing Distributed Embedded Devices[J]. IEEE Transactions on Computers, 2019,68(10):1411-1427.
|
[13] |
CHO J, CHOI K Y, DINUR I, et al. WEM: a New Family of White-box Block Ciphers Based on the Even-Mansour Construction [C]//Lecture Notes in Computer Science: 10159. Heidelberg: Springer Verlag, 2017: 293-308.
|
[14] |
BOGDANOV A, ISOBE T, TISCHHAUSER E. Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness [C]//Lecture Notes in Computer Science: 10031. Heidelberg: Springer Verlag, 2016: 126-158.
|
[15] |
SHI Y, WEI W, ZHANG F, et al. SDSRS: a Novel White-box Cryptography Scheme for Securing Embedded Devices in IIoT[J]. IEEE Transactions on Industrial Informatics, 2020,16(3):1602-1616.
|
[16] |
KWON J, LEE B H, LEE J Y, et al. FPL: White-box Secure Block Cipher Using Parallel Table Look-Ups [C]//Lecture Notes in Computer Science: 12006. Heidelberg: Springer Verlag, 2020: 106-128.
|
[17] |
SHIRAI T, SHIBUTANI K, AKISHITA T, et al. The 128-Bit Blockcipher CLEFIA [C]//Lecture Notes in Computer Science: 4593. Heidelberg: Springer Verlag, 2007: 181-195.
|
[18] |
SU S, DONG H, FU G, et al. A White-box CLEFIA Implementation for Mobile Devices [C]//Proceedings of the IET 2014 Communications Security Conference. London: IET, 2014: 0752.
|
[19] |
BIRYUKOV A, DE CANNIERE C, BRAEKEN A, et al. A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms [C]//Lecture Notes in Computer Science: 2656. Heidelberg: Springer Verlag, 2003: 33-50.
|
[20] |
DINUR I. An Improved Affine Equivalence Algorithm for Random Permutations [C]//Lecture Notes in Computer Science: 10820. Heidelberg: Springer Verlag, 2018: 413-442.
|