Results 11 to 20 of about 16,624 (253)
LPN-based Attacks in the White-box Setting
In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks.
Alex Charlès, Aleksei Udovenko
doaj +1 more source
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed in an untrusted environment. In this article, we revisit state-of-the-art countermeasures employed in white-box cryptography, and we discuss ...
Louis Goubin +2 more
doaj +1 more source
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
White-box cryptography attempts to protect cryptographic secrets in pure software implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by the industry even though the security of these constructions is not well defined ...
Okan Seker +2 more
doaj +1 more source
Improvement on a Masked White-Box Cryptographic Implementation
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj +1 more source
A Lightweight Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents
The white-box implementation of cryptography algorithm can hide key information even in the white-box attack context owing to the means of obfuscation.
Chao Jin +5 more
doaj +1 more source
Towards Secure and Efficient "white-box" Encryption [PDF]
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj +3 more sources
On Provable White-Box Security in the Strong Incompressibility Model
Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, where
Estuardo Alpirez Bock +2 more
doaj +1 more source
Revisiting software protection [PDF]
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.
A. Herzberg +25 more
core +2 more sources
Attacks Against White-Box ECDSA and Discussion of Countermeasures
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (ECDSA): First, we consider attack paths to break such implementations.
Sven Bauer +5 more
doaj +3 more sources
A framework for analyzing RFID distance bounding protocols [PDF]
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we
Avoine, Gildas +6 more
core +3 more sources

