2016
DOI: 10.1007/s11432-015-5474-8
|View full text |Cite
|
Sign up to set email alerts
|

Discussion on the theoretical results of white-box cryptography

Abstract: Protecting white-box cryptographic implementations with obfuscated round boundaries SCIENCE CHINA Information Sciences 61, 039103 (2018); Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability SCIENCE CHINA Information Sciences 61, 032102 (2018); Development of new correlations for the oil formation volume factor in oil reservoirs using artificial intelligent white box technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 41 publications
(56 reference statements)
0
4
0
Order By: Relevance
“…= ⊕ but 0 = , a contradiction. (7) return flag; (8) else if is 0 and 0 is ? then (9) if [ values, which omit the relationship between input and output differentials.…”
Section: Comparison With Previous Methodmentioning
confidence: 99%
See 3 more Smart Citations
“…= ⊕ but 0 = , a contradiction. (7) return flag; (8) else if is 0 and 0 is ? then (9) if [ values, which omit the relationship between input and output differentials.…”
Section: Comparison With Previous Methodmentioning
confidence: 99%
“…and is not " * " then (7) ← the number of rows of ; (8) for ← 0 to − 1 do (9) if [ , ] is 1 then (10) [ , ] ← 0; (11) [ of the augmented matrix unchanged. If is not in the set {0, ?, * }, we check each row of ; if the value of the th column at the th row , is 1, then we set Xor i to the last element of the th row of and set , to 0 (Algorithm 1).…”
Section: Determine the Solvability Of Smentioning
confidence: 99%
See 2 more Smart Citations