Efficient and Provable White-Box Primitives
From MaRDI portal
Publication:2958118
DOI10.1007/978-3-662-53887-6_6zbMath1404.94069OpenAlexW2551407130MaRDI QIDQ2958118
Pierre Karpman, Paul Kirchner, Pierre-Alain Fouque, Brice Minaud
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_6
Related Items (7)
Improved key-recovery attacks on reduced-round WEM-8 ⋮ Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting) ⋮ Efficient and Provable White-Box Primitives ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Security reductions for white-box key-storage in mobile payments ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Key-Recovery Attacks on ASASA
- Four $$\mathbb {Q}$$ : Four-Dimensional Decompositions on a $$\mathbb {Q}$$ -curve over the Mersenne Prime
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Big-Key Symmetric Encryption: Resisting Key Exfiltration
- BLAKE2: Simpler, Smaller, Fast as MD5
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- How to Obfuscate Programs Directly
- White-Box Security Notions for Symmetric Encryption Schemes
- Efficient and Provable White-Box Primitives
- An Introduction to Randomness Extractors
- A White-Box DES Implementation for DRM Applications
- Towards Security Notions for White-Box Cryptography
- Cryptanalysis of the Xiao – Lai White-Box AES Implementation
- Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Survey: Leakage Resilience and the Bounded Retrieval Model
- Leftover Hash Lemma, Revisited
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys
- Advanced Lectures on Machine Learning
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Cryptanalysis of White Box DES Implementations
- Selected Areas in Cryptography
- Theory of Cryptography
This page was built for publication: Efficient and Provable White-Box Primitives