Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person …
Software security with respect to reverse-engineering is a challenging discipline that has been researched for several years and which is still active. At the same time, this field is …
C Radu - US Patent 11,120,436, 2021 - Google Patents
A method of performing a payment transaction employing a two-factor authentication mechanism. The method includes engaging in cryptographic processing with a …
Providing security support for mobile ad-hoc networks is challenging for several reasons:(a) wireless networks are susceptible to attacks ranging from passive eavesdropping to active …
In this paper we pick up an old challenge to design public key or white-box constructions from symmetric cipher components. We design several encryption schemes based on the …
A Bogdanov, T Isobe - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
The need for software security in untrusted environments is ever increasing. White-box cryptography aims to ensure the security of cryptographic algorithms when the attacker has …
In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a novel white-box strategy. They propose to extend the round computations of a …
White-box cryptography has attracted a growing interest from researchers in the last decade. Several white-box implementations of standard block-ciphers (DES, AES) have been …
PA Fouque, P Karpman, P Kirchner… - … Conference on the Theory …, 2016 - Springer
In recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompressible. This includes the weak white-box ASASA …