This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (ECDSA): First, we consider attack paths to break such implementations. In particular, we provide a systematic overview of various fault attacks, to which ECDSA white-box implementations are especially susceptible. Then, we propose different mathematical countermeasures, mainly based on masking/blinding of sensitive variables, in order to prevent or at least make such attacks more difficult. We also briefly mention some typical implementational countermeasures and their challenges in the ECDSA white-box scenario. Our work has been initiated by the CHES challenge WhibOx Contest 2021, which consisted of designing and breaking white-box ECDSA impl...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model ...
The public defense on 12th June 2020 at 16:00 (4 p.m.) will be available via remote technology. Lin...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
White-box attack context assumes that the running environments of algorithms are visible and modifia...
peer reviewedWhite-box cryptography protects key extraction from software implementations of cryptog...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
peer reviewedThe goal of white-box cryptography is to protect secret keys embedded in a cryptographi...
International audienceThe goal of white-box cryptography is to protect secret keys embedded in a cry...
peer reviewedIn traditional symmetric cryptography, the adversary has access only to the inputs and ...
According to the standard paradigm, white box cryptographic primitives are used to block black box a...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model ...
The public defense on 12th June 2020 at 16:00 (4 p.m.) will be available via remote technology. Lin...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (E...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
Despite the growing demand for software implementations of ECDSA secure against attackers with full ...
White-box attack context assumes that the running environments of algorithms are visible and modifia...
peer reviewedWhite-box cryptography protects key extraction from software implementations of cryptog...
Cryptographic algorithms are designed to protect data or communication in the presence of an attacke...
peer reviewedThe goal of white-box cryptography is to protect secret keys embedded in a cryptographi...
International audienceThe goal of white-box cryptography is to protect secret keys embedded in a cry...
peer reviewedIn traditional symmetric cryptography, the adversary has access only to the inputs and ...
According to the standard paradigm, white box cryptographic primitives are used to block black box a...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorit...
This thesis studies the topic of 'white-box cryptography' (WBC), wh ich focuses on software implemen...
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model ...
The public defense on 12th June 2020 at 16:00 (4 p.m.) will be available via remote technology. Lin...