搜索结果: 1-11 共查到“军事学 White-Box Cryptography”相关记录11条 . 查询时间(0.078 秒)
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Differential fault analysis white-box cryptography countermeasure
2019/8/26
Differential Fault Analysis (DFA) intentionally injects some fault into the encryption process and analyzes a secret key from the mathematical relationship between faulty and fault-free ciphertexts. E...
Doubly half-injective PRGs for incompressible white-box cryptography
White-box cryptography Incompressibility One-way permutations
2019/4/1
White-box cryptography was originally introduced in the setting of digital rights management with the goal of preventing a user from illegally re-distributing their software decryption program. In rec...
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
white-box cryptography differential computational analysis software execution traces
2018/4/4
The goal of white-box cryptography is to implement cryptographic algorithms securely in software in the presence of an adversary that has complete access to the software's program code and execution e...
A New Digital Rights Management Solution Based on White-Box Cryptography
digital rights management white-box cryptography
2017/10/16
Digital rights management is an important technique to protect digital contents from abuse. Usually it is confronted with severe challenges because of the untrusted environment its application execute...
Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representatio...
Efficient Oblivious Transfer Protocols based on White-Box Cryptography
oblivious transfer white-box cryptography applications,secure function evaluation
2016/7/29
Oblivious transfer protocol is an important cryptographic primitive having numerous applications and particularly playing an essential role in secure multiparty computation protocols. On the other han...
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
White-Box Side-Channel CPA
2016/2/26
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its funda...
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
White-Box Cryptography Mode of Operation Hybrid-WBC
2015/12/24
We analyse and define practical requirements in white-box attack environment, and then propose secure and effective cryptographic constructions combining white-box cryptography (WBC) primitive and sta...
White-box cryptography has been developed to protect programs
against an adversary who has full access to their software implementation.
It has also been suggested as a countermeasure against side
...
White-Box Cryptography: Formal Notions and (Im)possibility Results
White-Box Cryptography Formal Notions WBP
2009/6/5
A key research question in computer security is whether
one can implement software that offers some protection
against software attacks from its execution platform. While
code obfuscation attempts ...
At CMS 2006 Bringer et al. show how to conceal the algebraic
structure of a \traceable block cipher" by adding perturbations
to its description. We here exploit and strengthen their ideas by furthe...