Login / Signup
Obfuscation for Cryptographic Purposes.
Dennis Hofheinz
John Malone-Lee
Martijn Stam
Published in:
J. Cryptol. (2010)
Keyphrases
</>
reverse engineering
smart card
static analysis
case study
key management
security protocols
data encryption standard
data sets
data mining
test cases
hash functions
control flow