Skip to main content
Log in

Protecting white-box cryptographic implementations with obfuscated round boundaries

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2003. 250–270

    Chapter  Google Scholar 

  2. Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005. 227–240

    Google Scholar 

  3. Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2009. 414–428

    Chapter  Google Scholar 

  4. Biryukov A, Bouillaguet C, Khovratovich D. Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2014. 63–84

    Google Scholar 

  5. Bogdanov A, Isobe T. White-box cryptography revisited: space-hard ciphers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015. 1058–1069

    Google Scholar 

  6. Bogdanov A, Isobe T, Tischhauser E. Towards practical whitebox cryptography: optimizing efficiency and space hardness. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2016. 126–158

    Google Scholar 

  7. Xu T, Liu F, Wu C K. A white-box AES-like implementation based on key-dependent substitution-linear transformations. Multimed Tools Appl, 2017, doi: 10.1007/s11042-017-4562-8

    Google Scholar 

  8. Delerablée C, Lepoint T, Paillier P, et al. White-box security notions for symmetric encryption schemes. In: Proceedings of International Conference on Selected Areas in Cryptography. Berlin: Springer, 2013. 247–264

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Key R&D Program of China (Grant No. 2016YFB0800100), CAS Strategic Priority Research Program (Grant No. XDA06010701), and National Natural Science Foundation of China (Grant No. 61671448).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Chuankun Wu or Feng Liu.

Additional information

The authors declare that they have no conflict of interest.

Supporting information Appendixes A and B. The supporting information is available online at info. scichina.com and link.springer.com. The supporting materials are published as submitted, without type-setting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, T., Wu, C., Liu, F. et al. Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci. China Inf. Sci. 61, 039103 (2018). https://doi.org/10.1007/s11432-016-9171-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-9171-6

Navigation