1. Kuo C C J, Kalker T, Zhou W S. Digital rights management--From the guest editors. IEEE Signal Processing Magazine, 2004, 21(2): 11-14
2. Wyseur B. White-box cryptography. Ph D Thesis. Leuven, Belgium: Katholieke Universiteit Leuven, 2009
3. Bogdanov A, Isobe T. White-box cryptography revisited: Space-hard ciphers. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15), 2015, Oct 12-16, Denver, CO, USA. New York, NY, USA: ACM, 2015: 1058-1069
4. Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. Selected Areas in Cryptography: Proceedings of the 9th International Workshop on Selected Areas in Cryptography (SAC’02), 2002, Aug 15-16, Newfoundland, Canada. LNCS 2595. Berlin, Germany: Springer, 2002: 250-270
5. Gilbert H. On white-box cryptography: Invited talk. Fast Software Encryption: Proceedings of the 23rd International Conference on Fast Software Encryption (FSE’16), 2016, Mar 20-23, Bochum, Germany. LNCS9783. Berlin, Germany: Springer, 2016
6. Chow S, Eisen P, Johnson H, et al. A white-box DES implementation for DRM applications. Proceedings of the 2002 ACM Workshop on Digital Rights Management (DRM’02), 2002, Nov 18, Washington, DC, USA. New York, NY, USA: ACM, 2002: 15p
7. Billet O, Gilbert H, Chatbi C E. Cryptanalysis of a white box AES implementation. Selected Areas in Cryptography: Proceedings of the 11th International Workshop on Selected Areas in Cryptography (SAC’04), 2004, Aug 9-10, Waterloo, Canada. LNCS 3357. Berlin, Germany: Springer, 2004: 227-240
8. Lepoint T, Rivain M, Mulder Y D, et al. Two attacks on a white-box AES implementation. Selected Areas in Cryptography: Proceedings of the 20th International Workshop on Selected Areas in Cryptography (SAC’13), 2013, Aug 14-16, Burnaby, Canada. LNCS 8282. Berlin, Germany: Springer, 2013: 265-285
9. Wyseur B, Michiels W, Gorissen P, et al. Cryptanalysis of white-box DES implementations with arbitrary external encodings. Selected Areas in Cryptography: Proceedings of the 14th International Workshop on Selected Areas in Cryptography (SAC’07), 2007, Aug 16-17, Ottawa, Canada. LNCS 4876. Berlin, Germany: Springer, 2007: 264-277
10. Xiao Y Y, Lai X J. A secure implementation of white-box AES. Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009, Dec 10-12, Jeju, Republic of Korea. Piscataway, NJ, USA: IEEE, 2009: 6p
11. Mulder Y D, Roelse P, Preneel B. Cryptanalysis of the Xiao-Lai white-box AES implementation. Selected Areas in Cryptography: Proceedings of the 19th International Conference on Selected Areas in Cryptography (SAC’12), 2012, Aug 15-16, Windsor, Canada. LNCS 7707. Berlin, Germany: Springer, 2012: 34-49
12. Karroumi M. Protecting white-box AES with dual ciphers. Information Security and Cryptology: Proceedings of the 13th International Conference on Information Security and Cryptology (ICISC’10), 2010, Dec 1-3, Seoul, Republic of Korea. LNCS 6829. Berlin, Germany: Springer, 2010: 278-291
13. Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations. Selected Areas in Cryptography: Proceedings of the 15th International Workshop on Selected Areas in Cryptography (SAC’08), 2008, Aug 14-15, Sackville, Canada. LNCS 5381. Berlin, Germany: Springer, 2009: 414-428
14. Biryukov A, Bouillaguet C, Khovratovich D. Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key. Advances in Cryptology--ASIACRYPT 2014: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’14): Part 1, 2014, Dec 7-11, Kaoshiung, China. LNCS 8874. Berlin, Germany: Springer, 2014: 63-84
15. Minaud B, Derbez P, Fouque P A, et al. Key-recovery attacks on ASASA. Advances in Cryptology--ASIACRYPT 2015: Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’15): Part 2, 2015, Nov 29-Dec 3, Auckland, New Zealand. LNCS 9453. Berlin, Germany: Springer, 2015: 3-27
16. Gilbert H, Plût J, Treger J. Key-recovery attack on the ASASA cryptosystem with expanding S-boxes. Advances in Cryptology--CRYPTO 2015: Proceedings of the 35th Annual Cryptology Conference (CRYPTO’15): Part 1, 2015, Aug 16-20, Santa Barbara, CA, USA. LNCS 9215. Berlin, Germany: Springer, 2015: 475-490
17. Bogdanov A, Isobe T, Tischhauser E. Towards practical whitebox cryptography: Optimizing efficiency and space hardness. Advances in Cryptology--ASIACRYPT 2016: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’16): Part 1, 2016, Dec 4-8, Hanoi, Vietnam. LNCS 10031. Berlin, Germany: Springer, 2016: 126-158
18. Fouque P A, Karpman P, Kirchner P, et al. Efficient and provable white-box primitives. Advances in Cryptology--ASIACRYPT 2016: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’16): Part 1, 2016, Dec 4-8, Hanoi, Vietnam. LNCS 10031. Berlin, Germany: Springer, 2016: 159-188
19. Cho J, Choi K Y, Dinur I, et al. WEM: A new family of white-box block ciphers based on the even-mansour construction. Topics in Cryptology--CT-RSA 2017: Proceedings of the 2017 Cryptographers' Track at the RSA Conference (CT-RSA’17), 2017, Feb 14-17, San Francisco, CA, USA. LNCS 10159. Berlin, Germany: Springer, 2017: 293-308
20. Billet O, Gilbert H. A traceable block cipher. Advances in Cryptology--ASIACRYPT 2003: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’03), 2003, Nov 30-Dec 4, Taipei, China. LNCS2894. Berlin, Germany: Springer, 2003: 331-346
21. Faugère J C, Perret L. Polynomial equivalence problems: Algorithmic and theoretical aspects. Advances in Cryptology--EUROCRYPT 2006: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’06), 2006, May 28-Jun 1, St Petersburg, Russia. LNCS 4004. Berlin, Germany: Springer, 2006: 30-47
22. Delerablée C, Lepoint T, Paillier P, et al. white-box security notions for symmetric encryption schemes. Selected Areas in Cryptography: Proceedings of the 20th International Workshop on Selected Areas in Cryptography (SAC’13), 2013, Aug 14-16, Burnaby, Canada. LNCS 8282. Berlin, Germany: Springer, 2013: 247-264
23. Ghită S V, Patriciu V V, Bica I. A new DRM architecture based on mobile code and white-box encryption. Proceedings of the 9th IEEE International Conference on Communications (COMM’12), 2012, Jun 21-23, Ottawa, Canada. Piscataway, NJ, USA: IEEE, 2012: 303-306
|