White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation

[1]  Amit Sahai,et al.  Indistinguishability Obfuscation from Well-Founded Assumptions , 2020, IACR Cryptol. ePrint Arch..

[2]  Wil Michiels,et al.  On the Security Goals of White-Box Cryptography , 2020, IACR Cryptol. ePrint Arch..

[3]  Jihoon Kwon,et al.  FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups , 2020, CT-RSA.

[4]  Wil Michiels,et al.  Doubly Half-Injective PRGs for Incompressible White-Box Cryptography , 2019, CT-RSA.

[5]  J. Cheon,et al.  Cryptanalysis of the CLT13 Multilinear Map , 2018, Journal of Cryptology.

[6]  Brice Minaud,et al.  On Recovering Affine Encodings in White-Box Implementations , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[7]  S. Halevi,et al.  Cryptanalyses of Candidate Branching Program Obfuscators , 2017, EUROCRYPT.

[8]  Andrey Bogdanov,et al.  Analysis of Software Countermeasures for Whitebox Encryption , 2017, IACR Trans. Symmetric Cryptol..

[9]  Jihoon Cho,et al.  WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction , 2017, CT-RSA.

[10]  Brice Minaud,et al.  Efficient and Provable White-Box Primitives , 2016, ASIACRYPT.

[11]  Andrey Bogdanov,et al.  Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness , 2016, ASIACRYPT.

[12]  Jung Hee Cheon,et al.  White-box AES implementation revisited , 2016, Journal of Communications and Networks.

[13]  Huijia Lin,et al.  Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes , 2016, EUROCRYPT.

[14]  Brent Waters,et al.  New Negative Results on Differing-Inputs Obfuscation , 2016, EUROCRYPT.

[15]  Nir Bitansky,et al.  Indistinguishability Obfuscation from Functional Encryption , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.

[16]  Andrey Bogdanov,et al.  White-Box Cryptography Revisited: Space-Hard Ciphers , 2015, CCS.

[17]  Abhishek Jain,et al.  Indistinguishability Obfuscation from Compact Functional Encryption , 2015, CRYPTO.

[18]  Alex Biryukov,et al.  Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) , 2014, ASIACRYPT.

[19]  Craig Gentry,et al.  Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.

[20]  Brent Waters,et al.  How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..

[21]  Amit Sahai,et al.  Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..

[22]  Brent Waters,et al.  Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[23]  Bart Preneel,et al.  Two Attacks on a White-Box AES Implementation , 2013, Selected Areas in Cryptography.

[24]  Tancrède Lepoint,et al.  White-Box Security Notions for Symmetric Encryption Schemes , 2013, Selected Areas in Cryptography.

[25]  Yael Tauman Kalai,et al.  Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.

[26]  Bart Preneel,et al.  Cryptanalysis of the Xiao - Lai White-Box AES Implementation , 2012, Selected Areas in Cryptography.

[27]  Bart Preneel,et al.  Cryptanalysis of a Perturbated White-Box AES Implementation , 2010, INDOCRYPT.

[28]  Mohamed Karroumi,et al.  Protecting White-Box AES with Dual Ciphers , 2010, ICISC.

[29]  Bart Preneel,et al.  Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings , 2007, IACR Cryptol. ePrint Arch..

[30]  Louis Goubin,et al.  Cryptanalysis of white box DES implementations , 2007, IACR Cryptol. ePrint Arch..

[31]  Oded Regev,et al.  On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.

[32]  Olivier Billet,et al.  Cryptanalysis of a White Box AES Implementation , 2004, Selected Areas in Cryptography.

[33]  Paul C. van Oorschot,et al.  A White-Box DES Implementation for DRM Applications , 2002, Digital Rights Management Workshop.

[34]  Dan Boneh,et al.  Attacking an Obfuscated Cipher by Injecting Faults , 2002, Digital Rights Management Workshop.

[35]  Paul C. van Oorschot,et al.  White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.

[36]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[37]  Satoshi Hada,et al.  Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.

[38]  M. Bellare,et al.  The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.

[39]  Takanori Isobe,et al.  A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs , 2022, IACR Cryptol. ePrint Arch..

[40]  Takanori Isobe,et al.  Yoroi: Updatable Whitebox Cryptography , 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[41]  Marc Fischlin,et al.  Security Reductions for White-Box Key-Storage in Mobile Payments , 2019, IACR Cryptol. ePrint Arch..

[42]  Eloi Sanfelix,et al.  Unboxing the White-Box Practical attacks against Obfuscated Ciphers , 2015 .

[43]  James A. Muir,et al.  A Tutorial on White-box AES , 2013, IACR Cryptol. ePrint Arch..

[44]  Julien Bringer,et al.  White Box Cryptography: Another Attempt , 2006, IACR Cryptol. ePrint Arch..

[45]  Hamilton E. Link,et al.  Clarifying Obfuscation: Improving the Security of White-Box Encoding , 2004, IACR Cryptol. ePrint Arch..

[46]  Li Yang White Box Cryptography , 2022 .