logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 3: 039103(2018) https://doi.org/10.1007/s11432-016-9171-6

Protecting white-box cryptographic implementations with obfuscated round boundaries

Tao XU1,2,3, Chuankun WU4,*, Feng LIU1,2,5,*, Ruoxin ZHAO1,2
More info
  • ReceivedSep 28, 2016
  • AcceptedJun 21, 2017
  • PublishedAug 25, 2017

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Key RD Program of China (Grant No. 2016YFB0800100), CAS Strategic Priority Research Program (Grant No. XDA06010701), and National Natural Science Foundation of China (Grant No. 61671448).


Supplement

Appendixes A and B.


References

[1] Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2003. 250--270. Google Scholar

[2] Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005. 227--240. Google Scholar

[3] Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2009. 414--428. Google Scholar

[4] Biryukov A, Bouillaguet C, Khovratovich D. Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2014. 63--84. Google Scholar

[5] Bogdanov A, Isobe T. White-box cryptography revisited: space-hard ciphers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015. 1058--1069. Google Scholar

[6] Bogdanov A, Isobe T, Tischhauser E. Towards practical whitebox cryptography: optimizing efficiency and space hardness. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2016. 126--158. Google Scholar

[7] Xu T, Liu F, Wu C. A white-box AES-like implementation based on key-dependent substitution-linear transformations. Multimed Tools Appl, 2017, 59 CrossRef Google Scholar

[8] Delerablée C, Lepoint T, Paillier P, et al. White-box security notions for symmetric encryption schemes. In: Proceedings of International Conference on Selected Areas in Cryptography. Berlin: Springer, 2013. 247--264. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号