Results 231 to 240 of about 41,930 (264)
Some of the next articles are maybe not open access.

White-Box Cryptography Revisited

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
The need for software security in untrusted environments is ever increasing. White-box cryptography aims to ensure the security of cryptographic algorithms when the attacker has full access to their implementations. However, there is no secure white-box implementation of standard block ciphers such as DES and AES known to date: All published techniques
Andrey Bogdanov, Takanori Isobe 0001
openaire   +2 more sources

White-box cryptography

Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
Businesses often interact with users via web-browsers and applications on mobile devices, and host services on cloud servers they may not own. Such highly-exposed environments employ white-box cryptography (WBC) for security protection. WBC operates on a security model far different from the traditional black-box model.
Yuan Xiang Gu   +4 more
openaire   +2 more sources

Neural Networks for White Box Cryptography in Software Protection Systems

International Journal of Computing
This research explores the integration of neural networks into software protection mechanisms, focusing on enhancing cryptographic robustness against unlicensed copying and unauthorized access. The primary purpose is to develop a robust method that combines obfuscation and encryption to protect software by binding its activation and operation to ...
Viktor Rovinskyi   +2 more
openaire   +2 more sources

White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family

International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019
White-box cryptography aims to ensure the security of cryptographic algorithms in an untrusted environment where the adversary has full access to their implementations. Typical applications are DRM, Pay Tv boxes, and smartphones. A number of white-box implementations for standard cryptographic algorithms—e.g., AES and DES—have been published in the ...
CIOSCHI, FEDERICO   +2 more
openaire   +3 more sources

White-Box Cryptography in the Gray Box

IACR Cryptology ePrint Archive, 2016
Pascal Sasdrich   +2 more
openaire   +3 more sources

An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography

2021 IEEE Region 10 Symposium (TENSYMP), 2021
Structural analysis is the study of finding component functions for a given function. In this paper, we proceed with structural analysis of structures consisting of the S (nonlinear Substitution) layer and the A (Affine or linear) layer.
Hyoung-Kyu Yim   +2 more
semanticscholar   +1 more source

Contributions to white-box cryptography : models and algebraic constructions. (Contributions à la cryptographie en boîte-blanche : modèles et constructions algébriques)

, 2023
Du fait de la démocratisation detechnologies telles que le paiement par mobile oul'essor des technologies basées sur la blockchain, lesbesoins d'implémentations sécurisées dans le modèleboîte blanche d'algorithmes standardisés sont de plusen plus ...
Pierre Galissant
semanticscholar   +1 more source

White-Box Cryptography

Encyclopedia of Cryptography and Security, 2011
B. Wyseur
openaire   +2 more sources

A Study on White-Box Cryptography based Integrity Verification Techniques for On-Device AI Model and Their Performance

Research Briefs on Information & Communication Technology Evolution
This paper studies White-Box Cryptography (WBC)–based integrity verification for protecting on-device AI models deployed on resource-constrained and potentially hostile platforms.
Jun Han Bin Lee, Y. Cho, Taeguen Kim
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy