Protecting white-box cryptographic implementations with obfuscated round boundaries

Dear editor, White-box cryptography aims to give a secure soft-ware implementation of the cryptographic algo-rithm running in an untrusted environment which is owned and controlled by an adversary. Its major goal is to protect the confidentiality of the secret key. Given the increasing demands for s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2018-03, Vol.61 (3), p.233-235, Article 039103
Hauptverfasser: Xu, Tao, Wu, Chuankun, Liu, Feng, Zhao, Ruoxin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Dear editor, White-box cryptography aims to give a secure soft-ware implementation of the cryptographic algo-rithm running in an untrusted environment which is owned and controlled by an adversary. Its major goal is to protect the confidentiality of the secret key. Given the increasing demands for software-only applications, white-box cryptography has received a lot of attention from industry. By now,
ISSN:1674-733X
1869-1919
DOI:10.1007/s11432-016-9171-6