Login / Signup
Revisiting Higher-Order Computational Attacks against White-Box Implementations.
Houssem Maghrebi
Davide Alessio
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
higher order
white box
black box
high order
natural images
markov random field
source code
pairwise
countermeasures
malicious attacks
lambda calculus
data mining
high dimensional
web applications
low order
lower order