Yoroi: Updatable whitebox cryptography
Y Koike, T Isobe - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Whitebox cryptography aims to provide security in the whitebox setting where the adversary
has unlimited access to the implementation and its environment. In order to ensure security …
has unlimited access to the implementation and its environment. In order to ensure security …
Hybrid code lifting on space-hard block ciphers: Application to yoroi and spnbox
There is a high demand for whitebox cryptography from the practical use of encryption in
untrusted environments. It has been actively discussed for two decades since Chow et al …
untrusted environments. It has been actively discussed for two decades since Chow et al …
A modular approach to the incompressibility of block-cipher-based AEADs
Incompressibility is one of the most fundamental security goals in white-box cryptography.
Given recent advances in the design of efficient and incompressible block ciphers such as …
Given recent advances in the design of efficient and incompressible block ciphers such as …
White-Box Block Cipher Implementation Based on LS-Design
HK Güner, C Mangır, O Yayla - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Protecting secret keys from malicious observers in untrusted environments is a critical
security issue. White-box cryptography suggests software protection by hiding the key in the …
security issue. White-box cryptography suggests software protection by hiding the key in the …
Cryptanalysis of Space-Hard Ciphers under Strong White-Box Security
B Li, Y Tang, Y Zhang, H Liu, D Li… - 2023 IEEE Intl Conf on …, 2023 - ieeexplore.ieee.org
White-box cryptography (WBC) was introduced by Chow et al. to convert a block cipher with
a secret key into a series of encoded look-up tables (LUTs). Many cryptanalysis methods …
a secret key into a series of encoded look-up tables (LUTs). Many cryptanalysis methods …
Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function
T Asanuma, T Isobe - Journal of Information Processing, 2023 - jstage.jst.go.jp
Device authentication is essential between network-connected Internet of Things (IoT)
devices and the systems connected to them to prevent security threats, such as leakage and …
devices and the systems connected to them to prevent security threats, such as leakage and …
Improving Performance in Space-Hard Algorithms
HK Güner, C Mangır, O Yayla - International Symposium on Cyber Security …, 2023 - Springer
Protecting secret keys from malicious observers is a major problem for cryptographic
algorithms in untrusted environments. White-box cryptography suggests hiding the key in the …
algorithms in untrusted environments. White-box cryptography suggests hiding the key in the …
A STUDY ON SPACE-HARD WHITE-BOX CRYPTOGRAPHY
HK Güner - 2023 - open.metu.edu.tr
Protecting secret keys from malicious observers is a major problem for cryptographic
algorithms in untrusted environments. White-box cryptography suggests hiding the key in the …
algorithms in untrusted environments. White-box cryptography suggests hiding the key in the …
[PDF][PDF] Hybrid Code Lifting on Space-Hard Block Ciphers
There is a high demand for whitebox cryptography from the practical use of encryption in
untrusted environments. It has been actively discussed for two decades since Chow et al …
untrusted environments. It has been actively discussed for two decades since Chow et al …
Check for updates Improving Performance in Space-Hard Algorithms
HK Güner, C Mangir, O Yayla - … CSCML 2023, Be'er Sheva, Israel …, 2023 - books.google.com
Protecting secret keys from malicious observers is a major problem for cryptographic
algorithms in untrusted environments. Whitebox cryptography suggests hiding the key in the …
algorithms in untrusted environments. Whitebox cryptography suggests hiding the key in the …