A tutorial on white-box AES

JA Muir - Advances in network analysis and its applications, 2012 - Springer
White-box cryptography concerns the design and analysis of implementations of
cryptographic algorithms engineered to execute on untrusted platforms. Such …

An updated survey on secure ECC implementations: Attacks, countermeasures and cost

J Fan, I Verbauwhede - Cryptography and Security: From Theory to …, 2012 - Springer
Unprotected implementations of cryptographic primitives are vulnerable to physical attacks.
While the adversary only needs to succeed in one out of many attack methods, the …

Obfuscation by partial evaluation of distorted interpreters

R Giacobazzi, ND Jones, I Mastroeni - Proceedings of the ACM …, 2012 - dl.acm.org
How to construct a general program obfuscator? We present a novel approach to
automatically generating obfuscated code P2 from any program P whose source code is …

[PDF][PDF] White-box cryptography: hiding keys in software

W Brecht - NAGRA Kudelski Group, 2012 - whiteboxcrypto.com
The initial goal of cryptography has been to design algorithms and protocols to protect a
communication channel against eavesdropping. This has been the main activity of modern …

Combination white box/black box cryptographic processes and apparatus

M Ciet, AJ Farrugia, JF Riendeau - US Patent 8,165,286, 2012 - Google Patents
Method and apparatus for increasing security of a cryptographic algorithm such as
deciphering, enciphering, or a digital signature. A cryptographic algorithm and a key are …

Masking with Randomized Look Up Tables: Towards Preventing Side-Channel Attacks of All Orders

FX Standaert, C Petit, N Veyrat-Charvillon - … on the Occasion of His 65th …, 2012 - Springer
We propose a new countermeasure to protect block ciphers implemented in leaking devices,
at the intersection between One-Time Programs and Boolean masking schemes. First, we …

[PDF][PDF] A non-deterministic self-checking mechanism to enhance tamper-resistance in engineering education software

YN Musa, RS Lima, SC Asensi, IL Yáñez… - International Journal of …, 2012 - ijee.ie
Obfuscation and code encryption applied to ensure confidentiality achieve some degree of
tamper resistance due to the complexity of the analysis required to break these protection …

[PDF][PDF] Key Recovery from Decayed Memory Images and Obfuscation of Cryptographic Algorithms

R Zahno - 2012 - spectrum.library.concordia.ca
A cold boot attack is a type of side channel attacks which exploit the data remanence
property of Random Access Memory (RAM) to retrieve contents that remain readable for a …

Masking countermeasures against HO-DPA: security evaluation and enhancement by specific mask encodings

H Maghrebi - 2012 - pastel.hal.science
Side channel attacks take advantage of the fact that the power consumption of a
cryptographic device depends on the internally used secret key. A very common …

An Obfuscated Implementation of RC4

R Zahno, AM Youssef - … and Information Technology: Proceedings of the …, 2012 - Springer
Because of its simplicity, ease of implementation, and speed, RC4 is one of the most widely
used software oriented stream ciphers. It is used in several popular protocols such as SSL …