Results 231 to 240 of about 16,624 (253)
Some of the next articles are maybe not open access.
White-Box Cryptography Revisited
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015The need for software security in untrusted environments is ever increasing. White-box cryptography aims to ensure the security of cryptographic algorithms when the attacker has full access to their implementations. However, there is no secure white-box implementation of standard block ciphers such as DES and AES known to date: All published techniques
Andrey Bogdanov, Takanori Isobe 0001
openaire +1 more source
Applying Software Protection to White-Box Cryptography
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015White-box cryptography sits at the intersection of software protection and cryptography. Software protection is aimed at preventing attackers from modifying software or extracting secrets from it through reverse-engineering or other means. Software protection becomes white-box cryptography when it is applied to software implementations of cryptographic
openaire +1 more source
A method for secure and efficient block cipher using white-box cryptography
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012Nowadays many information should be protected securely. Generally, they are encrypted by cryptographic algorithm. A secret value is used as encryption key which must not be exposed as public. However, the key can be extracted by adversary using white box attack.
Jaesung Yoo, Hanjae Jeong, Dongho Won
openaire +1 more source
On Conditions to Satisfy White-Box Cryptography
Journal of Security Engineering, 2014Though there have been a few trials to give the white-box cryptography, there is no secure system with that property. In this paper, we deal with the conditions to get the white-box cryptography.
openaire +1 more source
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
2021 IEEE Region 10 Symposium (TENSYMP), 2021Structural analysis is the study of finding component functions for a given function. In this paper, we proceed with structural analysis of structures consisting of the S (nonlinear Substitution) layer and the A (Affine or linear) layer. Our main interest is the S 1 AS 2 structure with different substitution layers and large input/output sizes.
Hyoungshin Yim +2 more
openaire +1 more source
White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family
2019White-box cryptography aims to ensure the security of cryptographic algorithms in an untrusted environment where the adversary has full access to their implementations. Typical applications are DRM, Pay Tv boxes, and smartphones. A number of white-box implementations for standard cryptographic algorithms—e.g., AES and DES—have been published in the ...
CIOSCHI, FEDERICO +2 more
openaire +2 more sources
Neural Networks for White Box Cryptography in Software Protection Systems
International Journal of ComputingThis research explores the integration of neural networks into software protection mechanisms, focusing on enhancing cryptographic robustness against unlicensed copying and unauthorized access. The primary purpose is to develop a robust method that combines obfuscation and encryption to protect software by binding its activation and operation to ...
Viktor Rovinskyi +2 more
openaire +1 more source
WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2022Weijie Deng, Zheng Gong
exaly
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
Science China Information Sciences, 2021Vincent Rijmen, Yupu Hu, Baocang Wang
exaly

