Results 11 to 20 of about 41,930 (264)
White-Box Cryptography: Don’t Forget About Grey-Box Attacks [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Estuardo Alpirez Bock +8 more
semanticscholar +5 more sources
White-Box Cryptography and an AES Implementation [PDF]
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened.
Stanley Chow +3 more
openaire +2 more sources
Towards Security Notions for White-Box Cryptography [PDF]
While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on software implementations of cryptographic primitives in an application. The aim of WBC is to resist attacks from an adversary having access to some `executable' code with an embedded secret ...
Saxena, Amitabh +2 more
openaire +2 more sources
White-box cryptography (WBC) seeks to protect secret keys even if the attacker has full control over the execution environment. One of the techniques to hide the key is space hardness approach, which conceals the key into a large lookup table generated ...
Xiangren Chen +8 more
doaj +2 more sources
The adversary model of white-box cryptography includes an extreme case where the adversary, sitting at the endpoint, has full access to a cryptographic scheme. Motivating by the fact that most existing white-box implementations focus on symmetric encryption, we present implementations for hash-based signatures so that the security against white-box ...
Kemal Bicakci +4 more
openaire +2 more sources
A Survey on White Box Cryptography Model for Mobile Payment Systems
The technology is showing rapid development and these developments are changing our lives, our habits, and our needs. As electronic devices, which are indispensable for our daily lives, continue to be intelligent, we are able to do our every operation through these devices. Mobile payment technologies and services are one of the innovations.
Aydın, Muhammed Ali +2 more
openaire +3 more sources
LPN-based Attacks in the White-box Setting
In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks.
Alex Charlès, Aleksei Udovenko
doaj +1 more source
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed in an untrusted environment. In this article, we revisit state-of-the-art countermeasures employed in white-box cryptography, and we discuss ...
Louis Goubin +2 more
doaj +1 more source
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
White-box cryptography attempts to protect cryptographic secrets in pure software implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by the industry even though the security of these constructions is not well defined ...
Okan Seker +2 more
doaj +1 more source
Improvement on a Masked White-Box Cryptographic Implementation
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj +1 more source

