Author of the publication

Security Reductions for White-Box Key-Storage in Mobile Payments.

, , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 221-252. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Guaranteed Throughput of Multizone Disks., , and . IEEE Trans. Computers, 52 (11): 1407-1420 (2003)Cryptanalysis of White-Box Implementations., , and . IACR Cryptology ePrint Archive, (2008)On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography., , , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 103-120. Springer, (2018)Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings., , , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 264-277. Springer, (2007)Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough., , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 215-236. Springer, (2016)Performance Ratios for the Karmarkar-Karp Differencing Method., , , and . Electron. Notes Discret. Math., (2003)A DFA Attack on White-Box Implementations of AES with External Encodings., , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 591-617. Springer, (2019)Cloning Object Detectors., , and . ICCE-Berlin, page 1-6. IEEE, (2022)Complexity of min-max subsequence problems., and . Inf. Process. Lett., 87 (4): 213-217 (2003)Mechanism for software tamper resistance: an application of white-box cryptography., and . Digital Rights Management Workshop, page 82-89. ACM, (2007)