Results 241 to 250 of about 41,930 (264)
Some of the next articles are maybe not open access.
Enhancement Of Image Watermarking Using White Box Cryptography
2025 IEEE 1st International Conference on Recent Trends in Computing and Smart Mobility (RCSM)Digital image watermarking is a crucial technique for protecting intellectual property and verifying the authenticity and integrity of images in the digital era. This thesis presents a robust and secure image watermarking system that integrates frequency-
Sonam Ahirwar +2 more
semanticscholar +1 more source
White-Box cryptography based data encryption-decryption scheme for IoT environment
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), 2019The economic progress of the Internet of Things (IoT) is phenomenal. Applications range from checking the alignment of some components during a manufacturing process, monitoring of transportation and pedestrian levels to enhance driving and walking path,
Arunima Saha, Chungath Srinivasan
semanticscholar +1 more source
Applying Software Protection to White-Box Cryptography
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015White-box cryptography sits at the intersection of software protection and cryptography. Software protection is aimed at preventing attackers from modifying software or extracting secrets from it through reverse-engineering or other means. Software protection becomes white-box cryptography when it is applied to software implementations of cryptographic
openaire +1 more source
, 2020
La cryptographie en boîte blanche explore les méthodes permettant de cacher une clé dans un logiciel cryptgraphique déployé dans le monde réel.
Junwei Wang
semanticscholar +1 more source
La cryptographie en boîte blanche explore les méthodes permettant de cacher une clé dans un logiciel cryptgraphique déployé dans le monde réel.
Junwei Wang
semanticscholar +1 more source
On Conditions to Satisfy White-Box Cryptography
Journal of Security Engineering, 2014Though there have been a few trials to give the white-box cryptography, there is no secure system with that property. In this paper, we deal with the conditions to get the white-box cryptography.
openaire +1 more source
A method for secure and efficient block cipher using white-box cryptography
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012Nowadays many information should be protected securely. Generally, they are encrypted by cryptographic algorithm. A secret value is used as encryption key which must not be exposed as public. However, the key can be extracted by adversary using white box attack.
Jaesung Yoo, Hanjae Jeong, Dongho Won
openaire +1 more source
International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, 2019
Trusted Execution Environments (TEEs) provide hardware support to isolate the execution of sensitive operations on mobile phones for improved security. However, they are not always available to use for application developers. To provide a consistent user
K. Bicakci +3 more
semanticscholar +1 more source
Trusted Execution Environments (TEEs) provide hardware support to isolate the execution of sensitive operations on mobile phones for improved security. However, they are not always available to use for application developers. To provide a consistent user
K. Bicakci +3 more
semanticscholar +1 more source
General digital rights management solution based on white-box cryptography
, 2021刘君, 胡予濮, 陈杰
semanticscholar +1 more source
A Protected Key-based Table Generation Method for White-Box Cryptography in IoT Environments
Journal of KIISEHye-Won Mun, Donggyu Kwak
semanticscholar +1 more source

