Results 231 to 240 of about 41,930 (264)
Some of the next articles are maybe not open access.
White-Box Cryptography Revisited
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015The need for software security in untrusted environments is ever increasing. White-box cryptography aims to ensure the security of cryptographic algorithms when the attacker has full access to their implementations. However, there is no secure white-box implementation of standard block ciphers such as DES and AES known to date: All published techniques
Andrey Bogdanov, Takanori Isobe 0001
openaire +2 more sources
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
Businesses often interact with users via web-browsers and applications on mobile devices, and host services on cloud servers they may not own. Such highly-exposed environments employ white-box cryptography (WBC) for security protection. WBC operates on a security model far different from the traditional black-box model.
Yuan Xiang Gu +4 more
openaire +2 more sources
Businesses often interact with users via web-browsers and applications on mobile devices, and host services on cloud servers they may not own. Such highly-exposed environments employ white-box cryptography (WBC) for security protection. WBC operates on a security model far different from the traditional black-box model.
Yuan Xiang Gu +4 more
openaire +2 more sources
Neural Networks for White Box Cryptography in Software Protection Systems
International Journal of ComputingThis research explores the integration of neural networks into software protection mechanisms, focusing on enhancing cryptographic robustness against unlicensed copying and unauthorized access. The primary purpose is to develop a robust method that combines obfuscation and encryption to protect software by binding its activation and operation to ...
Viktor Rovinskyi +2 more
openaire +2 more sources
White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family
International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019White-box cryptography aims to ensure the security of cryptographic algorithms in an untrusted environment where the adversary has full access to their implementations. Typical applications are DRM, Pay Tv boxes, and smartphones. A number of white-box implementations for standard cryptographic algorithms—e.g., AES and DES—have been published in the ...
CIOSCHI, FEDERICO +2 more
openaire +3 more sources
White-Box Cryptography in the Gray Box
IACR Cryptology ePrint Archive, 2016Pascal Sasdrich +2 more
openaire +3 more sources
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
2021 IEEE Region 10 Symposium (TENSYMP), 2021Structural analysis is the study of finding component functions for a given function. In this paper, we proceed with structural analysis of structures consisting of the S (nonlinear Substitution) layer and the A (Affine or linear) layer.
Hyoung-Kyu Yim +2 more
semanticscholar +1 more source
, 2023
Du fait de la démocratisation detechnologies telles que le paiement par mobile oul'essor des technologies basées sur la blockchain, lesbesoins d'implémentations sécurisées dans le modèleboîte blanche d'algorithmes standardisés sont de plusen plus ...
Pierre Galissant
semanticscholar +1 more source
Du fait de la démocratisation detechnologies telles que le paiement par mobile oul'essor des technologies basées sur la blockchain, lesbesoins d'implémentations sécurisées dans le modèleboîte blanche d'algorithmes standardisés sont de plusen plus ...
Pierre Galissant
semanticscholar +1 more source
Research Briefs on Information & Communication Technology Evolution
This paper studies White-Box Cryptography (WBC)–based integrity verification for protecting on-device AI models deployed on resource-constrained and potentially hostile platforms.
Jun Han Bin Lee, Y. Cho, Taeguen Kim
semanticscholar +1 more source
This paper studies White-Box Cryptography (WBC)–based integrity verification for protecting on-device AI models deployed on resource-constrained and potentially hostile platforms.
Jun Han Bin Lee, Y. Cho, Taeguen Kim
semanticscholar +1 more source

