Protecting white-box cryptographic implementations with obfuscated round boundaries
Dear editor, White-box cryptography aims to give a secure soft-ware implementation of the cryptographic algo-rithm running in an untrusted environment which is owned and controlled by an adversary. Its major goal is to protect the confidentiality of the secret key. Given the increasing demands for s...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2018-03, Vol.61 (3), p.233-235, Article 039103 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Dear editor,
White-box cryptography aims to give a secure soft-ware implementation of the cryptographic algo-rithm running in an untrusted environment which is owned and controlled by an adversary. Its major goal is to protect the confidentiality of the secret key. Given the increasing demands for software-only applications, white-box cryptography has received a lot of attention from industry. By now, |
---|---|
ISSN: | 1674-733X 1869-1919 |
DOI: | 10.1007/s11432-016-9171-6 |