Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

Methods, systems, and devices for an encrypted and obfuscated algorithm in a computing environment

FJ Malassenet, GD Sidle - US Patent 10,289,816, 2019 - Google Patents
A computer implemented method is disclosed for obfuscating an algorithm. The computer-
implemented method includes (1) receiving ciphertext input data, and (2) executing …

Towards practical whitebox cryptography: optimizing efficiency and space hardness

A Bogdanov, T Isobe, E Tischhauser - … on the Theory and Application of …, 2016 - Springer
Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted
environment where the adversary has full access to their implementation. Typical security …

Efficient and provable white-box primitives

PA Fouque, P Karpman, P Kirchner… - … Conference on the Theory …, 2016 - Springer
In recent years there have been several attempts to build white-box block ciphers whose
implementations aim to be incompressible. This includes the weak white-box ASASA …

On the security goals of white-box cryptography

EA Bock, A Amadori, C Brzuska… - IACR transactions on …, 2020 - moving-the-social.ub.rub.de
We discuss existing and new security notions for white-box cryptography and comment on
their suitability for Digital Rights Management and Mobile Payment Applications, the two …

Privacy and security of Aadhaar: a computer science perspective

S Agrawal, S Banerjee, S Sharma - Economic and Political Weekly, 2017 - JSTOR
The article investigates the privacy and security issues of Aadhaar from a technology point of
view. Specifically, the possibilities of identification and authentication without consent using …

White-box cryptography: don't forget about grey-box attacks

E Alpirez Bock, JW Bos, C Brzuska, C Hubain… - Journal of …, 2019 - Springer
Despite the fact that all current scientific white-box approaches of standardized
cryptographic primitives have been publicly broken, these attacks require knowledge of the …

Implicit white-box implementations: White-boxing ARX ciphers

A Ranea, J Vandersmissen, B Preneel - Annual International Cryptology …, 2022 - Springer
Since the first white-box implementation of AES published twenty years ago, no significant
progress has been made in the design of secure implementations against an attacker with …

How to reveal the secrets of an obscure white-box implementation

L Goubin, P Paillier, M Rivain, J Wang - Journal of Cryptographic …, 2020 - Springer
White-box cryptography (WBC) protects key extraction from software implementations of
cryptographic primitives. Many academic works have been done achieving partial results …

Yoroi: Updatable whitebox cryptography

Y Koike, T Isobe - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Whitebox cryptography aims to provide security in the whitebox setting where the adversary
has unlimited access to the implementation and its environment. In order to ensure security …