Then a synopsis and a review of following categories of obfuscating transformations are given.
随后对各种混淆变换作了简要的叙述和评论。
Then a synopsis and a review of obfuscating transformations are given.
文章介绍了混淆算法的力量、弹性、执行代价和隐蔽性等性能及其度量,简要叙述了各种混淆变换,总结了反混淆和对混淆算法的攻击方法,提出了若干可能的研究方向。
Two efficient implementation of mixcolumn operations are compared respectively and an improved implementation is proposed based on 32-bit embedded microprocessor ARM9.
介绍了分组密码Rijndael算法,比较了两种高效实现Rijndael算法中列混淆变换方法,并对基于32位ARM9微处理器提出了有效的改进方法。