New power-oriented methodology for dynamic resizing and mobility of reconfigurable wireless sensor networks

H Grichi, O Mosbahi, M Khalgui… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper deals with reconfigurable wireless sensor networks (RWSNs) that should be
adapted to their environment in order to minimize the energy consumption during the …

Survey on White-Box Attacks and Solutions

V Porkodi, M Sivaram, AS Mohammed… - Asian Journal of …, 2018 - ajcst.co
This Research paper provides special white-box attacks and outputs from it. Wearable IoT
units perform keep doubtlessly captured, then accessed within an unauthorized behavior …

Implicit white-box implementations: White-boxing ARX ciphers

A Ranea, J Vandersmissen, B Preneel - Annual International Cryptology …, 2022 - Springer
Since the first white-box implementation of AES published twenty years ago, no significant
progress has been made in the design of secure implementations against an attacker with …

[HTML][HTML] LWED: Lightweight white-box encryption communication system for drones over CARX algorithm

Y Yang, H Dong, Z Li, S Xiao - Journal of King Saud University-Computer …, 2023 - Elsevier
The application field of drones is being broadened with the development of communication
and computer technology, but the communication link and data security of drones are facing …

A lightweight nonlinear white-box sm4 implementation applied to edge iot agents

C Jin, Z Bao, W Miao, Z Zeng, X Wei, R Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
The white-box implementation of cryptography algorithm can hide key information even in
the white-box attack context owing to the means of obfuscation. However, under the …

Analysis and Improvement of white-box SM4 implementation

Y ZHANG, D XU, J CHEN - 电子与信息学报, 2022 - jeit.ac.cn
Abstract Differential Computational Analysis (DCA) is a side channel analysis method
applied to white box security analysis. Its efficiency has been verified in the analysis of white …

Optimized implementation of SM4 on AVR microcontrollers, RISC-V processors, and ARM processors

H Kwon, H Kim, S Eum, M Sim, H Kim, WK Lee… - IEEE …, 2022 - ieeexplore.ieee.org
At 2003, the SM4 block cipher was introduced that is a Chinese domestic cryptographic. It is
mandated in the Chinese National Standard for Wireless LAN Wired Authentication and …

An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices

Y Shi, W Wei, Z He, H Fan - Proceedings of the 32nd annual conference …, 2016 - dl.acm.org
Embedded devices with constrained computational resources, such as wireless sensor
network nodes, electronic tag readers, roadside units in vehicular networks, and smart …

Cryptanalysis of a white‐box SM4 implementation based on collision attack

R Wang, H Guo, J Lu, J Liu - IET Information Security, 2022 - Wiley Online Library
White‐box cryptography is to primarily protect the key of a cipher from being extracted in a
white‐box scenario, where an adversary has full access to the execution environment of …

[PDF][PDF] SM4 算法的一种新型白盒实现

姚思, 陈杰 - 密码学报, 2020 - jcr.cacrnet.org.cn
在白盒攻击环境中, 攻击者能够访问密码算法的实现过程, 观测密码算法的动态执行,
掌握算法的内部细节, 并任意修改. Chow 等人提出白盒密码的概念, 以应对白盒攻击环境 …