Results 221 to 230 of about 41,930 (264)

Physical One-Way Functions for Decentralized Consensus Via Proof of Physical Work. [PDF]

open access: yesAdv Sci (Weinh)
Winkler M   +9 more
europepmc   +1 more source

Implementation White-Box Cryptography for Elliptic Curve Cryptography

2021 10th Mediterranean Conference on Embedded Computing (MECO), 2021
The development of technologies makes it possible to increase the power of information processing systems, but the modernization of processors brings not only an increase in performance but also an increase in the number of errors and vulnerabilities that can allow an attacker to attack the system and gain access to confidential information.
Alla Levina   +2 more
exaly   +3 more sources

White-Box Cryptography: Security in an Insecure Environment

IEEE Security and Privacy, 2016
Public cryptographic implementations work when the secret key is stored in a tightly secured environment. But what happens if adversaries penetrate that environment? Although many hardware countermeasures aim to keep adversaries at bay, white-box cryptography can provide yet another layer of protection at the software level.
Aisling Connolly   +2 more
exaly   +3 more sources

Research on disturbing white‐box cryptography algorithm based on local differential privacy

Security and Privacy, 2023
AbstractWhite‐box cryptography protects the secret key extraction from software implementations of cryptographic primitives. The principle is to white‐box the key by using obfuscation and hide the key in the whole encryption process to ensure that the key cannot be traced and extracted.
Wenjun Luo, Die Lai, Zesen Dai
exaly   +3 more sources

SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT

IEEE Transactions on Industrial Informatics, 2020
In this article, with the rapid development of industrial Internet of Things, a large number of embedded devices, such as sensors and tag readers, have been widely deployed for gathering and sending data. These devices are commonly unreliable and vulnerable to many threats, because they are located in unattended areas which are vulnerable to device ...
Yang Shi, Wujing Wei, Fangguo Zhang
exaly   +3 more sources

Opportunities in White-Box Cryptography

IEEE Security and Privacy, 2010
White-box cryptography is the discipline of implementing a cryptographic algorithm in software such that an adversary will have difficulty extracting the cryptographic key. This approach assumes that the adversary has full access to and full control over the implementation's execution. White-box implementations can provide good protection when combined
Wil Michiels
exaly   +3 more sources

Implementation White Box Cryptography in Substitution-Permutation network

2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020
Advances in technology have led not only to increased security and privacy but also to new channels of information leakage. New leak channels have resulted in the emergence of increased relevance of various types of attacks. One such attacks are Side-Channel Attacks, i.e. attacks aimed to find vulnerabilities in the practical component of the algorithm.
Alla Levina   +2 more
exaly   +3 more sources

Discussion on the theoretical results of white-box cryptography

Science China Information Sciences, 2016
White-box cryptography (WBC) aims to resist attacks from attackers who can control all the implementation details of cryptographic schemes. In 2009, Saxena et al. proposed a fundamental of white-box cryptography via the notion ``white-box property (WBP).
TingTing Lin, Xuejia Lai
exaly   +3 more sources

Study on white-box cryptography: Key whitening and entropy attacks

2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2016
White-box cryptography is intended on saving software completions of algorithms based on cryptography against the recovery of key. They are mainly applied in applications based on Digital Rights Managements (DRM) as a cost effective substitute. This paper explains White-Box Cryptograph trends and some important problems, also focuses on two most ...
Subhranil Som
exaly   +3 more sources

Home - About - Disclaimer - Privacy