References
Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2003. 250–270
Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005. 227–240
Xu T, Wu C K, Liu F, et al. Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci China Inf Sci, 2018, 61: 039103
Biryukov A, Shamir A. Structural cryptanalysis of SASAS. In: Proceedings of Eurocrypt 2001. Berlin: Springer, 2001. 395–405
Baek C H, Cheon J H, Hong H. White-box AES implementation revisited. J Commun Netw, 2016, 18: 273–287
Lepoint T, Rivain M, de Mulder Y, et al. Two attacks on a white-box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2014. 265–285
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yeom, Y., Kim, DC., Baek, C.H. et al. Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography. Sci. China Inf. Sci. 63, 139106 (2020). https://doi.org/10.1007/s11432-019-9883-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-9883-9