최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.26 no.9, 2022년, pp.1382 - 1391
이진민 (Department of Future Convergence Technology Engineering, Sungshin Women's University) , 김소연 (Department of Future Convergence Technology Engineering, Sungshin Women's University) , 이일구 (Department of Future Convergence Technology Engineering, Sungshin Women's University)
White-box cryptography can respond to white-box attacks that can access and modify memory by safely hiding keys in the lookup table. However, because the size of lookup tables is large and the speed of encryption is slow, it is difficult to apply them to devices that require real-time while having l...
S. K. Lee and Y. S. Kang, "Principles and Statistical Analysis of White Box Ciphers," IITP Weekly ICT Trends, vol. 1977, pp. 15-25, Dec. 2020.
S. Chow, P. Eisen, H. Johnson, and P. C. V. Oorschot, "White-Box Cryptography and an AES Implementation," in Proceedings of International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, pp. 250-270, 2003.
Y. Xiao and X. Lai, "A Secure Implementation of White-Box AES," in Proceedings of 2009 2nd International Conference on Computer Science and its Applications, Jeju, Korea, pp. 1-6, 2009.
S. Lee, T. Kim, and Y. Kang, "A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis," IEEE Transactions on Information Forensics and Security, vol. 13, no. 10, pp. 2602-2615, Oct. 2018.
S. M. Cho, and S. H. Seo, "Current status of cryptographic technology applied to drone security," Review of Korea Institute of Information Security and Cryptology, vol.30, no. 2, pp.11-19. Apr. 2020.
S. -V. Ghita, V. -V. Patriciu, and I. Bica, "A new DRM architecture based on mobilel code and white-box encryption," in Proceedings of 2012 9th International Conference on Communications, Bucharest, Romania, pp. 303-306, 2012.
D. G. V. Albricci, M. Ceria, F. Cioschi, N. Fornari, A. Shakiba, and A. Visconti, "Measuring Performances of a White-Box Approach in the IoT Context," Symmetry, vol. 11, no. 8, pp. 1-19, Aug. 2019.
A. Saha and C. Srinivasan, "White-Box cryptography based data encryption-decryption scheme for IoT environment," in Proceedings of 2019 5th International Conference on Advanced Computing &Communication Systems, Coimbatore, India, pp. 637-641, 2019.
Y. Shi, W. Wei, H. Fan, M. H. Au, and X. Luo, "A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices," IEEE Transactions on Computers, vol. 68, no. 10, pp. 1411-1427, Oct. 2011.
L. Zhou, C. Su, Y. Wen, W. Li, and Z. Gong, "Towards practical white-box lightweight block cipher implementations for IoTs," Future Generation Computer Systems, vol. 86, no. 507-514, Sep. 2018.
K. Kapusta, G. Memmi, and H. Noura, "Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks," Annals of Telecommunications, vol. 74, no. 3-4, pp. 157-165, Apr. 2019.
doegox. Deadpool [Internet]. Available: https://github.com/SideChannelMarvels/Deadpool.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.