Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2016_9_a33, author = {D. N. Kolegov and O. V. Broslavsky and N. E. Oleksov}, title = {HMAC obfuscation method for implementation in untrusted systems}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {89--91}, publisher = {mathdoc}, number = {9}, year = {2016}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2016_9_a33/} }
TY - JOUR AU - D. N. Kolegov AU - O. V. Broslavsky AU - N. E. Oleksov TI - HMAC obfuscation method for implementation in untrusted systems JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2016 SP - 89 EP - 91 IS - 9 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2016_9_a33/ LA - ru ID - PDMA_2016_9_a33 ER -
D. N. Kolegov; O. V. Broslavsky; N. E. Oleksov. HMAC obfuscation method for implementation in untrusted systems. Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 89-91. http://geodesic.mathdoc.fr/item/PDMA_2016_9_a33/
[1] White-Box Cryptography: Protecting Cryptographic Keys in Software Applications, http://www.whiteboxcrypto.com/
[2] Chow W. S., Eisen P., Johnson H., Van Oorschot P. C., “A White-box DES Implementation for DRM Applications”, LNCS, 2696, 2003, 1–15 | Zbl
[3] Chow W. S., Eisen P., Johnson H., Van Oorschot P. C., “White-Box Cryptography and an AES Implementation”, LNCS, 2595, 2003, 250–270 | MR | Zbl
[4] RFC 2104. HMAC: Keyed-Hashing for Message Authentication, https://tools.ietf.org/html/rfc2104
[5] Menezes A. J., Van Oorschot P. C., Vanstone S. A., Handbook of Applied Cryptography, CRC Press, N.Y., 1997 | MR | Zbl
[6] jCrypto: White-Box Cryptography Tools for ECMAScript Language, https://github.com/tsu-iscd/jcrypto