Return to Article Details
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Download
Download PDF