标题:Protecting white-box cryptographic implementations with obfuscated round boundaries
作者:Xu Tao;Wu Chuankun;Liu Feng;Zhao Ruoxin
作者机构:[Xu Tao] Institute of Information Engineering, Chinese Academy of Sciences;;School of Cyber Security, University of Chinese Academy of Sciences;;New U 更多
通讯作者:Liu, Feng(liufeng@iie.ac.cn)
通讯作者地址:[Liu, F]Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China;[Liu, F]Univ Chinese Acad Sci, Sch Cyber S 更多
来源:中国科学. 信息科学
出版年:2018
卷:61
期:3
DOI:10.1007/s11432-016-9171-6
摘要:White-box cryptography aims to give a secure soft- ware implementation of the cryptographic algo- rithm running in an untrusted environment which is owned and controlled by an adversary. Its major goal is to protect the confidentiality of the secret key. Given the increasing demands for software- only applications, white-box cryptography has re- ceived a lot of attention from industry. By now, all publications of white-box cryptographic(WBC) implementations from public literatures can be di- vided into two groups:(i) implementations of ex- isting block ciphers such as AES and DES;(ii) ded- icated designs of block ciphers which are assumed to run in the white-box environment.
收录类别:EI;CSCD;SCOPUS;SCIE
资源类型:期刊论文
原文链接:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028654511&doi=10.1007%2fs11432-016-9171-6&partnerID=40&md5=bdda1197d5a9caf8b86a9f93a943535b
TOP