White-box cryptography: don't forget about grey-box attacks
From MaRDI portal
Publication:2010584
Recommendations
- Differential computation analysis: hiding your white-box designs is not enough
- On the ineffectiveness of internal encodings -- revisiting the DCA attack on white-box cryptography
- Attacks and countermeasures for white-box designs
- White-box cryptography in the gray box
- Higher-order DCA against standard side-channel countermeasures
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 176547 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1107704 (Why is no real title available?)
- scientific article; zbMATH DE number 1951616 (Why is no real title available?)
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 2009947 (Why is no real title available?)
- scientific article; zbMATH DE number 1504808 (Why is no real title available?)
- scientific article; zbMATH DE number 1759297 (Why is no real title available?)
- scientific article; zbMATH DE number 1759775 (Why is no real title available?)
- scientific article; zbMATH DE number 2087907 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.
- A survey of differential fault analysis against classical RSA implementations
- A traceable block cipher
- A white-box DES implementation for DRM applications
- Applied Cryptography and Network Security
- Attacking an obfuscated cipher by injecting faults
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Cryptanalysis of White Box DES Implementations
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Cryptanalysis of a Generic Class of White-Box Implementations
- Cryptanalysis of a perturbated white-box AES implementation
- Cryptanalysis of the Xiao-Lai white-box AES implementation
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Differential fault analysis of DES
- Fault analysis in cryptography. Foreword by Dan Boneh
- Higher-order side channel security and mask refreshing
- On the ineffectiveness of internal encodings -- revisiting the DCA attack on white-box cryptography
- Protecting obfuscation against algebraic attacks
- Protecting white-box AES with dual ciphers
- Selected Areas in Cryptography
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Towards Security Notions for White-Box Cryptography
- Towards sound approaches to counteract power-analysis attacks
- Two attacks on a white-box AES implementation
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- White-box cryptography in the gray box
- White-box security notions for symmetric encryption schemes
Cited in
(9)- Differential computation analysis: hiding your white-box designs is not enough
- Higher-order DCA against standard side-channel countermeasures
- White-box cryptography in the gray box
- On the ineffectiveness of internal encodings -- revisiting the DCA attack on white-box cryptography
- Security reductions for white-box key-storage in mobile payments
- A DFA attack on white-box implementations of AES with external encodings
- Improved key-recovery attacks on reduced-round WEM-8
- Attacks and countermeasures for white-box designs
- A white-box speck implementation using self-equivalence encodings
This page was built for publication: White-box cryptography: don't forget about grey-box attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010584)