Login / Signup

Obfuscation for Cryptographic Purposes.

Dennis HofheinzJohn Malone-LeeMartijn Stam
Published in: J. Cryptol. (2010)
Keyphrases
  • reverse engineering
  • smart card
  • static analysis
  • case study
  • key management
  • security protocols
  • data encryption standard
  • data sets
  • data mining
  • test cases
  • hash functions
  • control flow