Využití kryptografie (šifrování) je v zabránění přístupu k datem bez příslušného oprávnění. V některých případech jsou ale šifrovací algoritmy spuštěny na neznámém zařízení, například v případě přístupu k obsahu, chráněnému autorskými právy, na osobním počítači (hudba, filmy...). V tomto případě tradiční šifrovací modely nestačí zajistit bezpečnost dát. Ochranou dát v těchto podmínkách se zabývá white-box kryptografie (šifrování). Práce prezentuje různé návrhy ochranných prvků, jako i možnosti útoku na ně. Nedávný návrh dle Luo et al. k ochraně AES (Advance Encryption Standard byl implementován v C a studován v souvislosti s typy útoků dle Bos et al.Cryptography is used to prevent people accessing data they are not authorized to access. How...
Conventional software implementations of cryptographic algorithms are totally insecure where a hosti...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Nejenže jsou všechna současná vědecká white-box schémata standardizovaných šifer matematicky zlomená...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algori...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adve...
According to the standard paradigm, white box cryptographic primitives are used to block black box a...
peer reviewedWhite-box cryptography protects key extraction from software implementations of cryptog...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Conventional software implementations of cryptographic algorithms are totally insecure where a hosti...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Nejenže jsou všechna současná vědecká white-box schémata standardizovaných šifer matematicky zlomená...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algori...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adve...
According to the standard paradigm, white box cryptographic primitives are used to block black box a...
peer reviewedWhite-box cryptography protects key extraction from software implementations of cryptog...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
In software protection we typically have to deal with the white-box attack model. In this model an a...
Conventional software implementations of cryptographic algorithms are totally insecure where a hosti...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
In software protection we typically have to deal with the white-box attack model. In this model an a...