Abstract: A cryptographic-based encryption algorithm that has low memory and minimal output space requirements as well as involving reduced computational overheads without compromising the strength ...
You also might be interested in my Java implementation of the Chow's whitebox AES scheme. In my diploma thesis I suggest modifications and improvements for a new whitebox-suited symmetric-key ...
Abstract: In recent decades, malicious code reuse has surged in numbers and sophistication, it is a common practice among adversaries to reuse malicious code, which significantly threatens user ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results