Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
From MaRDI portal
Publication:2938838
DOI10.1007/978-3-662-45611-8_4zbMath1306.94030OpenAlexW2168130438MaRDI QIDQ2938838
Charles Bouillaguet, Dmitry Khovratovich, Alex Biryukov
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_4
Related Items (18)
On self-equivalence encodings in white-box implementations ⋮ An improved affine equivalence algorithm for random permutations ⋮ Efficient slide attacks ⋮ Key-recovery attacks on \(\mathsf{ASASA}\) ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting) ⋮ Implicit white-box implementations: white-boxing ARX ciphers ⋮ Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness ⋮ Efficient and Provable White-Box Primitives ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Security reductions for white-box key-storage in mobile payments ⋮ WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction ⋮ Algebraic Insights into the Secret Feistel Network ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Multiset structural attack on generalized Feistel networks ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers ⋮ A white-box speck implementation using self-equivalence encodings
This page was built for publication: Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)