Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Wil Michiels"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography. In particular, we put forwa
Externí odkaz:
https://doaj.org/article/e0c4bca0c4454a3d80c9b0845c36ae62
Publikováno v:
2022 IEEE 12th International Conference on Consumer Electronics (ICCE-Berlin).
Publikováno v:
2021 IEEE 10th International Conference on Cloud Networking (CloudNet).
Publikováno v:
ICCE-Berlin
Cloud-based payments, virtual car keys, and digital rights management are examples of consumer electronics applications that use secure software. White-box implementations of the Advanced Encryption Standard (AES) are important building blocks of sec
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography. In particular, we put forwa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9866e509648449e2c3fa12315c95c6fe
https://aaltodoc.aalto.fi/handle/123456789/102202
https://aaltodoc.aalto.fi/handle/123456789/102202
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
SAC
Attacks based on DFA are an important threat to the security of white-box AES implementations. DFA typically requires that the output of AES is known. The use of external encodings that obfuscate this output is therefore a straightforward and well-kn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::421a32795359715fd88761b1713cacee
https://doi.org/10.1007/978-3-030-38471-5_24
https://doi.org/10.1007/978-3-030-38471-5_24
Publikováno v:
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367
ASIACRYPT (1)
ASIACRYPT (1)
The goal of white-box cryptography is to provide security even when the cryptographic implementation is executed in adversarially controlled environments. White-box implementations nowadays appear in commercial products such as mobile payment applica
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f097a654fb816618cbbc6330fa62573f
https://doi.org/10.1007/978-3-030-64837-4_8
https://doi.org/10.1007/978-3-030-64837-4_8
Autor:
Joppe W. Bos, Eloi Sanfelix Gonzalez, Cristofaro Mune, Charles Hubain, Estuardo Alpirez Bock, Alexander Treff, Chris Brzuska, Wil Michiels, Philippe Teuwen
Publikováno v:
Journal of Cryptology, 32(4), 1095-1143. Springer
Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representation used by the implementation. In practice, the lev
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::17b17b640c2bb655a9d941973c72249b
https://research.tue.nl/nl/publications/9d863bed-b684-458b-94df-85fe4a21e5fe
https://research.tue.nl/nl/publications/9d863bed-b684-458b-94df-85fe4a21e5fe
Publikováno v:
Applied Cryptography and Network Security-16th International Conference, ACNS 2018, Proceedings, 103-120
STARTPAGE=103;ENDPAGE=120;TITLE=Applied Cryptography and Network Security-16th International Conference, ACNS 2018, Proceedings
Applied Cryptography and Network Security ISBN: 9783319933863
ACNS
STARTPAGE=103;ENDPAGE=120;TITLE=Applied Cryptography and Network Security-16th International Conference, ACNS 2018, Proceedings
Applied Cryptography and Network Security ISBN: 9783319933863
ACNS
The goal of white-box cryptography is to implement cryptographic algorithms securely in software in the presence of an adversary that has complete access to the software’s program code and execution environment. In particular, white-box cryptograph
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7f7c444fd01f2cd9522eea5721ce1f7a
https://research.tue.nl/nl/publications/ddf35f29-d858-4dcc-a76d-9082425f5163
https://research.tue.nl/nl/publications/ddf35f29-d858-4dcc-a76d-9082425f5163
Publikováno v:
Discrete Optimization, 9(1), 1-16. Elsevier
We consider the problem of partitioning a set of n numbers into m subsets of cardinality k = ⌈ n / m ⌉ or ⌊ n / m ⌋ , such that the maximum subset sum is minimal. We show that the performance ratio of the Differencing Method of Karmarkar and