New power-oriented methodology for dynamic resizing and mobility of reconfigurable wireless sensor networks
This paper deals with reconfigurable wireless sensor networks (RWSNs) that should be
adapted to their environment in order to minimize the energy consumption during the …
adapted to their environment in order to minimize the energy consumption during the …
Survey on White-Box Attacks and Solutions
V Porkodi, M Sivaram, AS Mohammed… - Asian Journal of …, 2018 - ajcst.co
This Research paper provides special white-box attacks and outputs from it. Wearable IoT
units perform keep doubtlessly captured, then accessed within an unauthorized behavior …
units perform keep doubtlessly captured, then accessed within an unauthorized behavior …
Implicit white-box implementations: White-boxing ARX ciphers
A Ranea, J Vandersmissen, B Preneel - Annual International Cryptology …, 2022 - Springer
Since the first white-box implementation of AES published twenty years ago, no significant
progress has been made in the design of secure implementations against an attacker with …
progress has been made in the design of secure implementations against an attacker with …
[HTML][HTML] LWED: Lightweight white-box encryption communication system for drones over CARX algorithm
Y Yang, H Dong, Z Li, S Xiao - Journal of King Saud University-Computer …, 2023 - Elsevier
The application field of drones is being broadened with the development of communication
and computer technology, but the communication link and data security of drones are facing …
and computer technology, but the communication link and data security of drones are facing …
A lightweight nonlinear white-box sm4 implementation applied to edge iot agents
C Jin, Z Bao, W Miao, Z Zeng, X Wei, R Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
The white-box implementation of cryptography algorithm can hide key information even in
the white-box attack context owing to the means of obfuscation. However, under the …
the white-box attack context owing to the means of obfuscation. However, under the …
Analysis and Improvement of white-box SM4 implementation
Y ZHANG, D XU, J CHEN - 电子与信息学报, 2022 - jeit.ac.cn
Abstract Differential Computational Analysis (DCA) is a side channel analysis method
applied to white box security analysis. Its efficiency has been verified in the analysis of white …
applied to white box security analysis. Its efficiency has been verified in the analysis of white …
Optimized implementation of SM4 on AVR microcontrollers, RISC-V processors, and ARM processors
At 2003, the SM4 block cipher was introduced that is a Chinese domestic cryptographic. It is
mandated in the Chinese National Standard for Wireless LAN Wired Authentication and …
mandated in the Chinese National Standard for Wireless LAN Wired Authentication and …
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices
Embedded devices with constrained computational resources, such as wireless sensor
network nodes, electronic tag readers, roadside units in vehicular networks, and smart …
network nodes, electronic tag readers, roadside units in vehicular networks, and smart …
Cryptanalysis of a white‐box SM4 implementation based on collision attack
R Wang, H Guo, J Lu, J Liu - IET Information Security, 2022 - Wiley Online Library
White‐box cryptography is to primarily protect the key of a cipher from being extracted in a
white‐box scenario, where an adversary has full access to the execution environment of …
white‐box scenario, where an adversary has full access to the execution environment of …
[PDF][PDF] SM4 算法的一种新型白盒实现
姚思, 陈杰 - 密码学报, 2020 - jcr.cacrnet.org.cn
在白盒攻击环境中, 攻击者能够访问密码算法的实现过程, 观测密码算法的动态执行,
掌握算法的内部细节, 并任意修改. Chow 等人提出白盒密码的概念, 以应对白盒攻击环境 …
掌握算法的内部细节, 并任意修改. Chow 等人提出白盒密码的概念, 以应对白盒攻击环境 …