Login / Signup

Obfuscation for Cryptographic Purposes.

Dennis HofheinzJohn Malone-LeeMartijn Stam
Published in: TCC (2007)
Keyphrases
  • smart card
  • reverse engineering
  • hash functions
  • artificial intelligence
  • key management
  • encryption key
  • real time
  • information retrieval
  • data structure
  • static analysis
  • control flow
  • security analysis
  • malware detection