Proceedings of the 15th International Joint Conference on E-Business and Telecommunications 2018
DOI: 10.5220/0006906107190724
|View full text |Cite
|
Sign up to set email alerts
|

Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In accordance with Kerkhoffs criterion in cryptography Broadnax et al (2018), the chaotic sequence generation algorithm is public and the encryption key is secret. In other words, if the recovery key is unknown, the protected vector map cannot be recovered to its original state.…”
Section: Cryptographic and Game Theory Definitionsmentioning
confidence: 99%
“…In accordance with Kerkhoffs criterion in cryptography Broadnax et al (2018), the chaotic sequence generation algorithm is public and the encryption key is secret. In other words, if the recovery key is unknown, the protected vector map cannot be recovered to its original state.…”
Section: Cryptographic and Game Theory Definitionsmentioning
confidence: 99%
“…In accordance with Kerkhoffs criterion in cryptography [32], the chaotic sequence generation algorithm is public and the encryption key is secret. In other words, if the recovery key is unknown, the protected vector map cannot be recovered to its original state.…”
Section: )mentioning
confidence: 99%