White-box cryptography and an AES implementation
S Chow, P Eisen, H Johnson… - Selected Areas in …, 2003 - Springer
Conventional software implementations of cryptographic algorithms are totally insecure
where a hostile user may control the execution environment, or where co-located with …
where a hostile user may control the execution environment, or where co-located with …
Cryptanalysis of a white box AES implementation
The white box attack context as described in [1, 2] is the common setting where
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
Protecting white-box AES with dual ciphers
M Karroumi - Information Security and Cryptology-ICISC 2010: 13th …, 2011 - Springer
In order to protect AES software running on untrusted platforms, Chow et al.(2002) designed
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …
[引用][C] A secure implementation of white-box AES
Y Xiao, X Lai - 2009 2nd International Conference on Computer …, 2009 - ieeexplore.ieee.org
White-Box attack context is the setting that the attacker has total access to the software
execution and can observe or manipulate the dynamic execution of whole or part of the …
execution and can observe or manipulate the dynamic execution of whole or part of the …
Two attacks on a white-box AES implementation
White-box cryptography aims to protect the secret key of a cipher in an environment in which
an adversary has full access to the implementation of the cipher and its execution …
an adversary has full access to the implementation of the cipher and its execution …
Cryptanalysis of the Xiao–Lai white-box AES implementation
Y De Mulder, P Roelse, B Preneel - … , Windsor, ON, Canada, August 15-16 …, 2013 - Springer
In the white-box attack context, ie, the setting where an implementation of a cryptographic
algorithm is executed on an untrusted platform, the adversary has full access to the …
algorithm is executed on an untrusted platform, the adversary has full access to the …
White-box security notions for symmetric encryption schemes
White-box cryptography has attracted a growing interest from researchers in the last decade.
Several white-box implementations of standard block-ciphers (DES, AES) have been …
Several white-box implementations of standard block-ciphers (DES, AES) have been …
White-box cryptography revisited: Space-hard ciphers
A Bogdanov, T Isobe - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
The need for software security in untrusted environments is ever increasing. White-box
cryptography aims to ensure the security of cryptographic algorithms when the attacker has …
cryptography aims to ensure the security of cryptographic algorithms when the attacker has …
Cryptanalysis of a generic class of white-box implementations
W Michiels, P Gorissen, HDL Hollmann - Selected Areas in Cryptography …, 2009 - Springer
A white-box implementation of a block cipher is a software implementation from which it is
difficult for an attacker to extract the cryptographic key. Chow et al. published white-box …
difficult for an attacker to extract the cryptographic key. Chow et al. published white-box …
Cryptanalysis of a perturbated white-box AES implementation
In response to various cryptanalysis results on white-box cryptography, Bringer et al.
presented a novel white-box strategy. They propose to extend the round computations of a …
presented a novel white-box strategy. They propose to extend the round computations of a …