Return to Article Details Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography Download Download PDF