White-box cryptography (WBC) for secure pseudorandom permutations (block ciphers) is known as an unsolved long-standing open problem in the cryptographic community, with tremendous real world applications. The most fundamental security notion in WBC is unbreakability (UBK), which guarantees hardness in extracting the embedded secret keys from software implementations of cryptographic primitives running in untrusted environments. In this work we build a compiler, taking a secret key for the block cipher as input, and outputting an UBK-secure implementation. Our starting point explores the ways of attaining such implementations from decomposable functional encryption. Our final construction relies solely on representing functions as branching...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
A software watermarking scheme can embed a message into a program while preserving its functionality...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a n...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, an...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Abstract. In response to various cryptanalysis results on white-box cryptography, Bringer et al. pre...
International audienceIn recent years there have been several attempts to build white-box block ciph...
International audienceIn recent years there have been several attempts to build white-box block ciph...
International audienceIn recent years there have been several attempts to build white-box block ciph...
International audienceIn recent years there have been several attempts to build white-box block ciph...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
A software watermarking scheme can embed a message into a program while preserving its functionality...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a n...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
We argue that the invertibility of a block cipher can reduce the security of schemes that use it, an...
This thesis investigates the realizability of white-box implementations for secure pseudorandom perm...
Boneh et al. (Crypto 13) and Banerjee and Peikert (Crypto 14) constructed pseudorandom functions (PR...
Abstract. In response to various cryptanalysis results on white-box cryptography, Bringer et al. pre...
International audienceIn recent years there have been several attempts to build white-box block ciph...
International audienceIn recent years there have been several attempts to build white-box block ciph...
International audienceIn recent years there have been several attempts to build white-box block ciph...
International audienceIn recent years there have been several attempts to build white-box block ciph...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
A software watermarking scheme can embed a message into a program while preserving its functionality...
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature t...