On the security goals of white-box cryptography

EA Bock, A Amadori, C Brzuska… - IACR transactions on …, 2020 - tches.iacr.org
We discuss existing and new security notions for white-box cryptography and comment on
their suitability for Digital Rights Management and Mobile Payment Applications, the two …

Yoroi: Updatable whitebox cryptography

Y Koike, T Isobe - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Whitebox cryptography aims to provide security in the whitebox setting where the adversary
has unlimited access to the implementation and its environment. In order to ensure security …

: white-box secure block cipher using parallel table look-ups

J Kwon, BH Lee, J Lee, D Moon - Cryptographers' Track at the RSA …, 2020 - Springer
In this work, we propose a new table-based block cipher structure, dubbed FPL, that can be
used to build white-box secure block ciphers. Our construction is a balanced Feistel cipher …

On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography

E Alpirez Bock, C Brzuska, W Michiels… - Applied Cryptography and …, 2018 - Springer
The goal of white-box cryptography is to implement cryptographic algorithms securely in
software in the presence of an adversary that has complete access to the software's program …

SDSRS: A novel white-box cryptography scheme for securing embedded devices in IIoT

Y Shi, W Wei, F Zhang, X Luo, Z He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, with the rapid development of industrial Internet of Things, a large number of
embedded devices, such as sensors and tag readers, have been widely deployed for …

WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix

J Liu, V Rijmen, Y Hu, J Chen, B Wang - Science China Information …, 2022 - Springer
White-box cryptography aims to provide secure cryptographic primitives and
implementations for the white-box attack model, which assumes that an adversary has full …

Security reductions for white-box key-storage in mobile payments

E Alpirez Bock, C Brzuska, M Fischlin, C Janson… - Advances in Cryptology …, 2020 - Springer
The goal of white-box cryptography is to provide security even when the cryptographic
implementation is executed in adversarially controlled environments. White-box …

[HTML][HTML] LWED: Lightweight white-box encryption communication system for drones over CARX algorithm

Y Yang, H Dong, Z Li, S Xiao - Journal of King Saud University-Computer …, 2023 - Elsevier
The application field of drones is being broadened with the development of communication
and computer technology, but the communication link and data security of drones are facing …

Hybrid code lifting on space-hard block ciphers: Application to yoroi and spnbox

Y Todo, T Isobe - IACR Transactions on Symmetric Cryptology, 2022 - tosc.iacr.org
There is a high demand for whitebox cryptography from the practical use of encryption in
untrusted environments. It has been actively discussed for two decades since Chow et al …

Pured: a unified framework for resource-hard functions

A Biryukov, M Lombard-Platet - International Conference on Cryptology in …, 2023 - Springer
Algorithm hardness can be described by 5 categories: hardness in computation, in
sequential computation, in memory, in energy consumption (or bandwidth), in code size …