Two Attacks on a White-Box AES Implementation
From MaRDI portal
Publication:2949534
DOI10.1007/978-3-662-43414-7_14zbMath1339.94051OpenAlexW1938099525MaRDI QIDQ2949534
Peter Roelse, Tancrède Lepoint, Yoni de Mulder, Bart Preneel, Matthieu Rivain
Publication date: 1 October 2015
Published in: Selected Areas in Cryptography -- SAC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43414-7_14
Related Items (10)
On self-equivalence encodings in white-box implementations ⋮ White-box ECDSA: challenges and existing solutions ⋮ Cryptanalysis of two white-box implementations of the SM4 block cipher ⋮ White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation ⋮ Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction ⋮ White-Box Cryptography in the Gray Box ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ A white-box speck implementation using self-equivalence encodings
This page was built for publication: Two Attacks on a White-Box AES Implementation