Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

Analysis of software countermeasures for whitebox encryption

S Banik, A Bogdanov, T Isobe, MB Jepsen - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the
whitebox model where the adversary has full access to the execution environment. To attain …

White-box cryptography: don't forget about grey-box attacks

E Alpirez Bock, JW Bos, C Brzuska, C Hubain… - Journal of …, 2019 - Springer
Despite the fact that all current scientific white-box approaches of standardized
cryptographic primitives have been publicly broken, these attacks require knowledge of the …

Securing cryptographic keys in the cloud: A survey

B AlBelooshi, E Damiani, K Salah… - IEEE Cloud …, 2016 - ieeexplore.ieee.org
Public cloud users are increasingly interested in securing their data and network traffic by
using outsourced encryption or decryption services (cryptography as a service). However …

Splitting S-boxes in a white-box implementation to resist attacks

W Michiels, J Hoogerbrugge - US Patent 9,838,198, 2017 - Google Patents
A method of performing a keyed cryptographic operation mapping an input message to an
output message, wherein the input message comprises m input data and the output …

White-box implementation of stream cipher

K Fukushima, S Hidano, S Kiyomoto - International Conference on …, 2017 - scitepress.org
White-box cryptography is a software obfuscation technique for cryptography
implementation. It can protect the secret key even if an attacker has full access and control …

Criptografia de White Box. Aplicació dels atacs d'injecció de falta.

A Gutiérrez Mercader - 2017 - openaccess.uoc.edu
Aquest treball forma part dels estudis del grau en enginyeria informàtica de la Universitat
Oberta de Catalunya. Pertany a l'àrea de seguretat informàtica i la part pràctica d'aquest s' …

[PDF][PDF] Design de cryptographie white-box: et à la fin, c'est Kerckhoffs qui gagne

JW Bos, C Hubain, W Michiels, P Teuwen - sstic.org
Bien que toutes les tentatives académiques actuelles pour créer des primitives
cryptographiques standard en «white-box» aient été cassées, il y a encore un grand nombre …

Útoky na white-box AES

JG Rigot - 2016 - dspace.cvut.cz
Cryptography is used to prevent people accessing data they are not authorized to access.
However in some case the algorithm used for encrypting data are performed on an untrusted …

[PDF][PDF] Cryptographic Keys Security in the Cloud

B AlBelooshi - 2016 - khalifauniversity.elsevierpure.com
Cloud Computing is one of the most popular emerging trends in the world of Information
Technology. It supplies ICT infrastructure, including servers, storage and networking …