[1] CHOW S, EISEN P, JOHNSON H, et al. White-box cryptography and an AES implementation[C]//SAC 2002:Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography, LNCS 2595. Berlin:Springer-Verlag, 2003:257-270. [2] BILLET O, GILBERT H, ECH-CHATBI C. Crytanalysis of a white-box AES implementation[C]//SAC 2004:Proceedings of the 11th Annual International Workshop on Selected Areas in Cryptography, LNCS 3357. Berlin:Springer-Verlag, 2005:227-240. [3] KARROUMI M. Protecting white-box AES with dual ciphers[C]//ICISC 2010:Proceedings of the 13th International Conference on Information Security and Cryptology, LNCS 6829. Berlin:Springer-Verlag, 2011:278-291. [4] XIAO Y, LAI X. A secure implementation of white-box AES[C]//CSA 2009:Proceedings of the 2nd International Conference on Computer Science and its Applocations. Piscataway, NJ:IEEE, 2009:410-415. [5] DE MULDER Y, ROELSE P, PRENEEL B. Cryptanalysis of the Xiao-Lai White-Box AES implementation[C]//SAC 2012:Proceedings of the 19th International Conference on Selected Areas in Cryptography, LNCS 7707. Berlin:Springer-Verlag, 2012:34-49. [6] 张效强,王峰,高开明.基于加密算法的数据安全传输的研究与设计[J].计算机与数字工程,2008,36(5):107-109. (ZHANG X Q,WANG F,GAO K M. Research and design for secure transmission of data based on encrypt algorithms[J]. Computer and Digital Engineering, 2008, 36(5):107-109.). [7] National Institute of Standards and Technology. Advanced Encryption Standard (AES) (FIPS PUB 197)[S/OL]. Federal Information Processing Standards Publication, 2001(2001-11-06)[2016-03-06]. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. [8] BARKAN E, BIHAM E. In how many ways can you write Rijndael[C]//ASIACRYPT 2002:Proceedings of the 2002 International Conference on the Theory and Application of Cryptology and Information, LNCS 2501. Berlin:Springer-Verlag, 2002:160-175. [9] KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C]//CRYPTO 1996:Proceedings of the 16th Annual International Cryptology Conference, LNCS 1109. Berlin:Springer-Verlag, 1996:104-113. [10] BIRYUKOV A, DE CANNIÈRE C, BREAKEN A, et al. A toolbox for cryptanalysis:linear and affine equivalence algorithms[C]//EUROCRYPT 2003:Proceedings of the 2003 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 2656. Berlin:Springer-Verlag, 2003:33-50. |