White-box cryptography and an AES implementation

S Chow, P Eisen, H Johnson… - Selected Areas in …, 2003 - Springer
Conventional software implementations of cryptographic algorithms are totally insecure
where a hostile user may control the execution environment, or where co-located with …

Preventing piracy, reverse engineering, and tampering

G Naumovich, N Memon - computer, 2003 - ieeexplore.ieee.org
With the advent of networked appliances, mobile code, and pervasive access to the Internet,
software protection has gained Increasing Importance. The authors survey current and …

Revisiting software protection

PC Van Oorschot - International Conference on Information Security, 2003 - Springer
We provide a selective survey on software protection, including approaches to software
tamper resistance, obfuscation, software diversity, and white-box cryptography. We review …

Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts

A Young, M Yung - Information Security and Privacy: 8th Australasian …, 2003 - Springer
There has been much recent research in designing symmetric ciphers with backdoors that
have either public designs or black-box designs. Current Digital Rights Management needs …

Protecting digital archives at the greek orthodox archdiocese of america

T Nicolakis, CE Pizano, B Prumo, M Webb - … of the 3rd ACM workshop on …, 2003 - dl.acm.org
The Greek Orthodox Archdiocese of America~(GOA) has amassed a rich and varied
collection of artifacts associated with two thousand years of religious and historical tradition …

Obfuscated instructions for software protection

A Monden, A Monsifrot… - … Science Technical Report, 2003 - naist.repo.nii.ac.jp
Many computer systems are designed to make it easy for end-users to install and update
software. An undesirable side-effect, from the perspective of many software producers, is …

[PDF][PDF] Estrutura de uma arquitetura para digital rights management: um plug-in para controle do uso de conteúdos digitais

JP Ezequiel - 2003 - core.ac.uk
O crescimento considerável de informações que circulam pela rede mundial de
computadores gera uma ampliação no comércio digital, motivando por conseqüência o …

[引用][C] DRM–Em busca da perfeição gerando o aumento da segurança dos serviços oferecidos pela WEB

JP Ezequiel, CM Westphall - Congresso Brasileiro de Computação. Florianópolis, 2003