White-box cryptography: don't forget about grey-box attacks
DOI10.1007/S00145-019-09315-1zbMATH Open1435.94121OpenAlexW2621243127WikidataQ128413903 ScholiaQ128413903MaRDI QIDQ2010584FDOQ2010584
Authors: Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, W. Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
Publication date: 27 November 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-019-09315-1
Recommendations
- Differential computation analysis: hiding your white-box designs is not enough
- On the ineffectiveness of internal encodings -- revisiting the DCA attack on white-box cryptography
- Attacks and countermeasures for white-box designs
- White-box cryptography in the gray box
- Higher-order DCA against standard side-channel countermeasures
differential power analysisdifferential fault analysiswhite-box cryptographysoftware execution tracesdifferential computation analysis
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.
- Applied Cryptography and Network Security
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fault analysis in cryptography. Foreword by Dan Boneh
- Title not available (Why is that?)
- Towards sound approaches to counteract power-analysis attacks
- Title not available (Why is that?)
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Title not available (Why is that?)
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Higher-order side channel security and mask refreshing
- Two attacks on a white-box AES implementation
- A white-box DES implementation for DRM applications
- Attacking an obfuscated cipher by injecting faults
- Protecting white-box AES with dual ciphers
- Cryptanalysis of the Xiao-Lai white-box AES implementation
- Cryptanalysis of a Generic Class of White-Box Implementations
- Title not available (Why is that?)
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Cryptanalysis of White Box DES Implementations
- Selected Areas in Cryptography
- Protecting obfuscation against algebraic attacks
- White-box cryptography in the gray box
- On the ineffectiveness of internal encodings -- revisiting the DCA attack on white-box cryptography
- A survey of differential fault analysis against classical RSA implementations
- Differential fault analysis of DES
- White-box security notions for symmetric encryption schemes
- Cryptanalysis of a perturbated white-box AES implementation
- Towards Security Notions for White-Box Cryptography
- Title not available (Why is that?)
- A traceable block cipher
Cited In (9)
- Differential computation analysis: hiding your white-box designs is not enough
- Higher-order DCA against standard side-channel countermeasures
- White-box cryptography in the gray box
- On the ineffectiveness of internal encodings -- revisiting the DCA attack on white-box cryptography
- Security reductions for white-box key-storage in mobile payments
- Improved key-recovery attacks on reduced-round WEM-8
- A DFA attack on white-box implementations of AES with external encodings
- Attacks and countermeasures for white-box designs
- A white-box speck implementation using self-equivalence encodings
Uses Software
This page was built for publication: White-box cryptography: don't forget about grey-box attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010584)