White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation
暂无分享,去创建一个
[1] Amit Sahai,et al. Indistinguishability Obfuscation from Well-Founded Assumptions , 2020, IACR Cryptol. ePrint Arch..
[2] Wil Michiels,et al. On the Security Goals of White-Box Cryptography , 2020, IACR Cryptol. ePrint Arch..
[3] Jihoon Kwon,et al. FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups , 2020, CT-RSA.
[4] Wil Michiels,et al. Doubly Half-Injective PRGs for Incompressible White-Box Cryptography , 2019, CT-RSA.
[5] J. Cheon,et al. Cryptanalysis of the CLT13 Multilinear Map , 2018, Journal of Cryptology.
[6] Brice Minaud,et al. On Recovering Affine Encodings in White-Box Implementations , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[7] S. Halevi,et al. Cryptanalyses of Candidate Branching Program Obfuscators , 2017, EUROCRYPT.
[8] Andrey Bogdanov,et al. Analysis of Software Countermeasures for Whitebox Encryption , 2017, IACR Trans. Symmetric Cryptol..
[9] Jihoon Cho,et al. WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction , 2017, CT-RSA.
[10] Brice Minaud,et al. Efficient and Provable White-Box Primitives , 2016, ASIACRYPT.
[11] Andrey Bogdanov,et al. Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness , 2016, ASIACRYPT.
[12] Jung Hee Cheon,et al. White-box AES implementation revisited , 2016, Journal of Communications and Networks.
[13] Huijia Lin,et al. Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes , 2016, EUROCRYPT.
[14] Brent Waters,et al. New Negative Results on Differing-Inputs Obfuscation , 2016, EUROCRYPT.
[15] Nir Bitansky,et al. Indistinguishability Obfuscation from Functional Encryption , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[16] Andrey Bogdanov,et al. White-Box Cryptography Revisited: Space-Hard Ciphers , 2015, CCS.
[17] Abhishek Jain,et al. Indistinguishability Obfuscation from Compact Functional Encryption , 2015, CRYPTO.
[18] Alex Biryukov,et al. Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) , 2014, ASIACRYPT.
[19] Craig Gentry,et al. Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[20] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[21] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[22] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[23] Bart Preneel,et al. Two Attacks on a White-Box AES Implementation , 2013, Selected Areas in Cryptography.
[24] Tancrède Lepoint,et al. White-Box Security Notions for Symmetric Encryption Schemes , 2013, Selected Areas in Cryptography.
[25] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[26] Bart Preneel,et al. Cryptanalysis of the Xiao - Lai White-Box AES Implementation , 2012, Selected Areas in Cryptography.
[27] Bart Preneel,et al. Cryptanalysis of a Perturbated White-Box AES Implementation , 2010, INDOCRYPT.
[28] Mohamed Karroumi,et al. Protecting White-Box AES with Dual Ciphers , 2010, ICISC.
[29] Bart Preneel,et al. Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings , 2007, IACR Cryptol. ePrint Arch..
[30] Louis Goubin,et al. Cryptanalysis of white box DES implementations , 2007, IACR Cryptol. ePrint Arch..
[31] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[32] Olivier Billet,et al. Cryptanalysis of a White Box AES Implementation , 2004, Selected Areas in Cryptography.
[33] Paul C. van Oorschot,et al. A White-Box DES Implementation for DRM Applications , 2002, Digital Rights Management Workshop.
[34] Dan Boneh,et al. Attacking an Obfuscated Cipher by Injecting Faults , 2002, Digital Rights Management Workshop.
[35] Paul C. van Oorschot,et al. White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.
[36] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[37] Satoshi Hada,et al. Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.
[38] M. Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[39] Takanori Isobe,et al. A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs , 2022, IACR Cryptol. ePrint Arch..
[40] Takanori Isobe,et al. Yoroi: Updatable Whitebox Cryptography , 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[41] Marc Fischlin,et al. Security Reductions for White-Box Key-Storage in Mobile Payments , 2019, IACR Cryptol. ePrint Arch..
[42] Eloi Sanfelix,et al. Unboxing the White-Box Practical attacks against Obfuscated Ciphers , 2015 .
[43] James A. Muir,et al. A Tutorial on White-box AES , 2013, IACR Cryptol. ePrint Arch..
[44] Julien Bringer,et al. White Box Cryptography: Another Attempt , 2006, IACR Cryptol. ePrint Arch..
[45] Hamilton E. Link,et al. Clarifying Obfuscation: Improving the Security of White-Box Encoding , 2004, IACR Cryptol. ePrint Arch..
[46] Li Yang. White Box Cryptography , 2022 .