A white-box speck implementation using self-equivalence encodings
From MaRDI portal
Publication:2096645
DOI10.1007/978-3-031-09234-3_38OpenAlexW4285225977MaRDI QIDQ2096645
Joachim Vandersmissen, Bart Preneel, Adrián H. Ranea
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-09234-3_38
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On self-equivalence encodings in white-box implementations
- Polybori: A framework for Gröbner-basis computations with Boolean polynomials
- On the ineffectiveness of internal encodings -- revisiting the DCA attack on white-box cryptography
- Differential computation analysis: hiding your white-box designs is not enough
- White-box cryptography: don't forget about grey-box attacks
- A white-box speck implementation using self-equivalence encodings
- Key-recovery attacks on \(\mathsf{ASASA}\)
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Two Attacks on a White-Box AES Implementation
- Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness
- Cryptanalysis of a Perturbated White-Box AES Implementation
- A White-Box DES Implementation for DRM Applications
- Attacking an Obfuscated Cipher by Injecting Faults
- Protecting White-Box AES with Dual Ciphers
- Cryptanalysis of the Xiao – Lai White-Box AES Implementation
- Cryptanalysis of a Generic Class of White-Box Implementations
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Cryptanalysis of White Box DES Implementations
- Selected Areas in Cryptography
This page was built for publication: A white-box speck implementation using self-equivalence encodings