Login / Signup

Attacking an Obfuscated Cipher by Injecting Faults.

Matthias JacobDan BonehEdward W. Felten
Published in: Digital Rights Management Workshop (2002)
Keyphrases