Results 221 to 230 of about 41,930 (264)
Improving deep learning-based neural distinguisher with multiple ciphertext pairs for speck and Simon. [PDF]
Hou Y, Liu J, Han S, Ma Z, Ye X, Nie X.
europepmc +1 more source
Physical One-Way Functions for Decentralized Consensus Via Proof of Physical Work. [PDF]
Winkler M +9 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Implementation White-Box Cryptography for Elliptic Curve Cryptography
2021 10th Mediterranean Conference on Embedded Computing (MECO), 2021The development of technologies makes it possible to increase the power of information processing systems, but the modernization of processors brings not only an increase in performance but also an increase in the number of errors and vulnerabilities that can allow an attacker to attack the system and gain access to confidential information.
Alla Levina +2 more
exaly +3 more sources
White-Box Cryptography: Security in an Insecure Environment
IEEE Security and Privacy, 2016Public cryptographic implementations work when the secret key is stored in a tightly secured environment. But what happens if adversaries penetrate that environment? Although many hardware countermeasures aim to keep adversaries at bay, white-box cryptography can provide yet another layer of protection at the software level.
Aisling Connolly +2 more
exaly +3 more sources
Research on disturbing white‐box cryptography algorithm based on local differential privacy
Security and Privacy, 2023AbstractWhite‐box cryptography protects the secret key extraction from software implementations of cryptographic primitives. The principle is to white‐box the key by using obfuscation and hide the key in the whole encryption process to ensure that the key cannot be traced and extracted.
Wenjun Luo, Die Lai, Zesen Dai
exaly +3 more sources
SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT
IEEE Transactions on Industrial Informatics, 2020In this article, with the rapid development of industrial Internet of Things, a large number of embedded devices, such as sensors and tag readers, have been widely deployed for gathering and sending data. These devices are commonly unreliable and vulnerable to many threats, because they are located in unattended areas which are vulnerable to device ...
Yang Shi, Wujing Wei, Fangguo Zhang
exaly +3 more sources
Opportunities in White-Box Cryptography
IEEE Security and Privacy, 2010White-box cryptography is the discipline of implementing a cryptographic algorithm in software such that an adversary will have difficulty extracting the cryptographic key. This approach assumes that the adversary has full access to and full control over the implementation's execution. White-box implementations can provide good protection when combined
Wil Michiels
exaly +3 more sources
Implementation White Box Cryptography in Substitution-Permutation network
2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020Advances in technology have led not only to increased security and privacy but also to new channels of information leakage. New leak channels have resulted in the emergence of increased relevance of various types of attacks. One such attacks are Side-Channel Attacks, i.e. attacks aimed to find vulnerabilities in the practical component of the algorithm.
Alla Levina +2 more
exaly +3 more sources
Discussion on the theoretical results of white-box cryptography
Science China Information Sciences, 2016White-box cryptography (WBC) aims to resist attacks from attackers who can control all the implementation details of cryptographic schemes. In 2009, Saxena et al. proposed a fundamental of white-box cryptography via the notion ``white-box property (WBP).
TingTing Lin, Xuejia Lai
exaly +3 more sources
Study on white-box cryptography: Key whitening and entropy attacks
2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2016White-box cryptography is intended on saving software completions of algorithms based on cryptography against the recovery of key. They are mainly applied in applications based on Digital Rights Managements (DRM) as a cost effective substitute. This paper explains White-Box Cryptograph trends and some important problems, also focuses on two most ...
Subhranil Som
exaly +3 more sources

