Cryptographic Key Masking During Run-Time
Many of the products commercially available today contain some form of encrypted or hashed data. It can involve DRM protection, licenses and certificates, signatures or identification information. Regardless of what the data is intended for, it is protected for a reason and may be worth a great deal o...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Institutionen för teknik och naturvetenskap
2008
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12034 |