2018
DOI: 10.1109/tifs.2018.2825939
|View full text |Cite
|
Sign up to set email alerts
|

A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 21 publications
0
15
0
Order By: Relevance
“…This section provides a brief overview of the past design of masked WB-AES with a 128-bit key [20]. To do so, the principle of a customized masking technique on white-box cryptography is explained based on Chow's WB-AES [5].…”
Section: Past Design Of Masked Wb-aesmentioning
confidence: 99%
See 3 more Smart Citations
“…This section provides a brief overview of the past design of masked WB-AES with a 128-bit key [20]. To do so, the principle of a customized masking technique on white-box cryptography is explained based on Chow's WB-AES [5].…”
Section: Past Design Of Masked Wb-aesmentioning
confidence: 99%
“…More importantly, these countermeasures require a run-time random source in order to generate masks uniformly at random and select one of the two lookup table sets, respectively. To prevent the key leakage by statistical analysis without using run-time random number generators, two techniques were incorporated into Chow's WB-AES [20]. First, each byte at the right-hand side of Equation (1) was concealed by masks randomly picked for each value of x i∈{0,1,2,3} .…”
Section: Past Design Of Masked Wb-aesmentioning
confidence: 99%
See 2 more Smart Citations
“…Obfuscation techniques or the randomization of the location of the lookup tables can be used to enhance security of white-box algorithms [50], while [51] examines how these techniques are successful against both DCA and differential power attacks (DPA). The paper [52] exploits noncommutative groups to obfuscate operation that should be made on commutative ones and it is employed in the IoT framework.…”
Section: The White-box Approachmentioning
confidence: 99%