The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed in an untrusted environment. In this article, we revisit state-of-the-art countermeasures employed in white-box cryptography, and we discuss possible ways to combine them. Then we analyze the different gray-box attack paths and study their performances in terms of required traces and computation time. Afterward, we propose a new paradigm for the gray-box attack against white-box cryptography, which exploits the data-dependency of the target implementation. We demonstrate that our approach provides substantial complexity improvements over the existing attacks. Finally, we showcase this new technique by breaking the three winning AES-128...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Abstract. White-box cryptography techniques are aimed at protecting software implementations of cryp...
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model ...
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software de...
International audienceThe goal of white-box cryptography is to protect secret keys embedded in a cry...
International audienceWhite-box cryptography (WBC) protects key extraction from software implementat...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algori...
The public defense on 12th June 2020 at 16:00 (4 p.m.) will be available via remote technology. Lin...
International audienceWhite-box cryptography aims to protect the secret key of a cipher in an enviro...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
According to the standard paradigm, white box cryptographic primitives are used to block black box a...
We discuss existing and new security notions for white-box cryptography and comment on their suitabi...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Abstract. White-box cryptography techniques are aimed at protecting software implementations of cryp...
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model ...
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software de...
International audienceThe goal of white-box cryptography is to protect secret keys embedded in a cry...
International audienceWhite-box cryptography (WBC) protects key extraction from software implementat...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algori...
The public defense on 12th June 2020 at 16:00 (4 p.m.) will be available via remote technology. Lin...
International audienceWhite-box cryptography aims to protect the secret key of a cipher in an enviro...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
According to the standard paradigm, white box cryptographic primitives are used to block black box a...
We discuss existing and new security notions for white-box cryptography and comment on their suitabi...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Abstract. White-box cryptography techniques are aimed at protecting software implementations of cryp...
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model ...