搜索结果: 1-2 共查到“军事学 White-Box Designs”相关记录2条 . 查询时间(0.073 秒)
In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implem...
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
White-Box Designs Differential Computation Analysis
2015/12/24
Although all current scientific white-box approaches of standardized cryptographic
primitives are broken, there is still a large number of companies which sell 搒ecure?white-box
products. In this pap...