Results 11 to 20 of about 16,624 (253)

LPN-based Attacks in the White-box Setting

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks.
Alex Charlès, Aleksei Udovenko
doaj   +1 more source

Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed in an untrusted environment. In this article, we revisit state-of-the-art countermeasures employed in white-box cryptography, and we discuss ...
Louis Goubin   +2 more
doaj   +1 more source

A White-Box Masking Scheme Resisting Computational and Algebraic Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
White-box cryptography attempts to protect cryptographic secrets in pure software implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by the industry even though the security of these constructions is not well defined ...
Okan Seker   +2 more
doaj   +1 more source

Improvement on a Masked White-Box Cryptographic Implementation

open access: yesIEEE Access, 2020
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj   +1 more source

A Lightweight Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents

open access: yesIEEE Access, 2023
The white-box implementation of cryptography algorithm can hide key information even in the white-box attack context owing to the means of obfuscation.
Chao Jin   +5 more
doaj   +1 more source

Towards Secure and Efficient "white-box" Encryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj   +3 more sources

On Provable White-Box Security in the Strong Incompressibility Model

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, where
Estuardo Alpirez Bock   +2 more
doaj   +1 more source

Revisiting software protection [PDF]

open access: yes, 2003
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.
A. Herzberg   +25 more
core   +2 more sources

Attacks Against White-Box ECDSA and Discussion of Countermeasures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (ECDSA): First, we consider attack paths to break such implementations.
Sven Bauer   +5 more
doaj   +3 more sources

A framework for analyzing RFID distance bounding protocols [PDF]

open access: yes, 2010
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we
Avoine, Gildas   +6 more
core   +3 more sources

Home - About - Disclaimer - Privacy