Results 21 to 30 of about 41,930 (264)
A Lightweight Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents
The white-box implementation of cryptography algorithm can hide key information even in the white-box attack context owing to the means of obfuscation.
Chao Jin +5 more
doaj +1 more source
Towards Secure and Efficient "white-box" Encryption [PDF]
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj +3 more sources
On Provable White-Box Security in the Strong Incompressibility Model
Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, where
Estuardo Alpirez Bock +2 more
doaj +1 more source
Attacks Against White-Box ECDSA and Discussion of Countermeasures
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (ECDSA): First, we consider attack paths to break such implementations.
Sven Bauer +5 more
doaj +3 more sources
Revisiting software protection [PDF]
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.
A. Herzberg +25 more
core +2 more sources
A framework for analyzing RFID distance bounding protocols [PDF]
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we
Avoine, Gildas +6 more
core +3 more sources
On White-box Cryptography and Obfuscation
We study the relationship between obfuscation and white-box cryptography. We capture the requirements of any white-box primitive using a \emph{White-Box Property (WBP)} and give some negative/positive results. Loosely speaking, the WBP is defined for some scheme and a security notion (we call the pair a \emph{specification}), and implies that w.r.t ...
Amitabh Saxena, Brecht Wyseur
openaire +2 more sources
Cryptanalysis of ARX-based White-box Implementations
At CRYPTO’22, Ranea, Vandersmissen, and Preneel proposed a new way to design white-box implementations of ARX-based ciphers using so-called implicit functions and quadratic-affine encodings. They suggest the Speck block-cipher as an example target.
Alex Biryukov +2 more
doaj +1 more source
DWB-AES: an implementation of dynamic white-box based on AES
The resources of IoT devices are limited.Therefore, security, flexibility and lightweight cryptographic modules are required.The idea of white-box cryptography can meet the needs of IoT devices.In common AES white-box implementations, keys are bound to ...
Bin WANG +3 more
doaj +2 more sources
A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission
Secure transmission of medical images and medical data is essential in healthcare systems, both in telemedicine and AI approaches. The compromise of images and medical data could affect patient privacy and the accuracy of diagnosis.
Francesco Castro +2 more
doaj +1 more source

