Results 241 to 250 of about 41,930 (264)
Some of the next articles are maybe not open access.

Enhancement Of Image Watermarking Using White Box Cryptography

2025 IEEE 1st International Conference on Recent Trends in Computing and Smart Mobility (RCSM)
Digital image watermarking is a crucial technique for protecting intellectual property and verifying the authenticity and integrity of images in the digital era. This thesis presents a robust and secure image watermarking system that integrates frequency-
Sonam Ahirwar   +2 more
semanticscholar   +1 more source

White-Box cryptography based data encryption-decryption scheme for IoT environment

2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), 2019
The economic progress of the Internet of Things (IoT) is phenomenal. Applications range from checking the alignment of some components during a manufacturing process, monitoring of transportation and pedestrian levels to enhance driving and walking path,
Arunima Saha, Chungath Srinivasan
semanticscholar   +1 more source

Applying Software Protection to White-Box Cryptography

Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015
White-box cryptography sits at the intersection of software protection and cryptography. Software protection is aimed at preventing attackers from modifying software or extracting secrets from it through reverse-engineering or other means. Software protection becomes white-box cryptography when it is applied to software implementations of cryptographic
openaire   +1 more source

On the practical security of white-box cryptography. (De la théorie à la pratique de la cryptographie en boite blanche)

, 2020
La cryptographie en boîte blanche explore les méthodes permettant de cacher une clé dans un logiciel cryptgraphique déployé dans le monde réel.
Junwei Wang
semanticscholar   +1 more source

On Conditions to Satisfy White-Box Cryptography

Journal of Security Engineering, 2014
Though there have been a few trials to give the white-box cryptography, there is no secure system with that property. In this paper, we deal with the conditions to get the white-box cryptography.
openaire   +1 more source

A method for secure and efficient block cipher using white-box cryptography

Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Nowadays many information should be protected securely. Generally, they are encrypted by cryptographic algorithm. A secret value is used as encryption key which must not be exposed as public. However, the key can be extracted by adversary using white box attack.
Jaesung Yoo, Hanjae Jeong, Dongho Won
openaire   +1 more source

Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography

International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, 2019
Trusted Execution Environments (TEEs) provide hardware support to isolate the execution of sensitive operations on mobile phones for improved security. However, they are not always available to use for application developers. To provide a consistent user
K. Bicakci   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy