Results 1 to 10 of about 16,525 (153)

AES Based White Box Cryptography in Digital Signature Verification [PDF]

open access: yesSensors, 2022
According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults.
Piyush Kumar Shukla   +4 more
doaj   +6 more sources

On the Linear Transformation in White-Box Cryptography [PDF]

open access: yesIEEE Access, 2020
A linear transformation is applied to the white-box cryptographic implementation for the diffusion effect to prevent key-dependent intermediate values from being analyzed.
Seungkwang Lee   +2 more
doaj   +4 more sources

On the Security Goals of White-Box Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock   +3 more
doaj   +7 more sources

Cryptanalysis of a white‐box SM4 implementation based on collision attack

open access: yesIET Information Security, 2022
White‐box cryptography is to primarily protect the key of a cipher from being extracted in a white‐box scenario, where an adversary has full access to the execution environment of software implementation. Since the introduction of white‐box cryptography,
Rusi Wang   +3 more
doaj   +2 more sources

White Box Implementations Using Non-Commutative Cryptography [PDF]

open access: yesSensors, 2019
In this paper, we present a method to create a safe arithmetic that can be used to obfuscate implementations that require operations over commutative groups.
Leandro Marin
doaj   +3 more sources

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In some practical enciphering frameworks, operational constraints may require that a secret key be embedded into the cryptographic algorithm. Such implementations are referred to as White-Box Cryptography (WBC).
Claude Carlet   +2 more
doaj   +5 more sources

A Secure and Efficient White-Box Implementation of SM4 [PDF]

open access: yesEntropy
Differential Computation Analysis (DCA) leverages memory traces to extract secret keys, bypassing countermeasures employed in white-box designs, such as encodings.
Xiaobo Hu   +8 more
doaj   +2 more sources

Doubly Half-Injective PRGs for Incompressible White-Box Cryptography

open access: yesLecture Notes in Computer Science, 2019
White-box cryptography was originally introduced in the setting of digital rights management with the goal of preventing a user from illegally re-distributing their software decryption program. In recent years, mobile payment has become a popular new application for white-box cryptography. Here, white-box cryptography is used to increase the robustness
Estuardo Alpirez Böck, Joppe W Bos
exaly   +6 more sources

On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography

open access: yesLecture Notes in Computer Science, 2018
The goal of white-box cryptography is to implement cryptographic algorithms securely in software in the presence of an adversary that has complete access to the software’s program code and execution environment. In particular, white-box cryptography needs to protect the embedded secret key from being extracted. Bos et al.
Estuardo Alpirez Böck
exaly   +5 more sources

ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Despite the growing demand for software implementations of ECDSA secure against attackers with full control of the execution environment, scientific literature on ECDSA white-box design is scarce. The CHES 2021 WhibOx contest was thus held to assess the
Guillaume Barbu   +8 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy