References
Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2003. 250–270
Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005. 227–240
Michiels W, Gorissen P, Hollmann H D L. Cryptanalysis of a generic class of white-box implementations. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2009. 414–428
Biryukov A, Bouillaguet C, Khovratovich D. Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2014. 63–84
Bogdanov A, Isobe T. White-box cryptography revisited: space-hard ciphers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2015. 1058–1069
Bogdanov A, Isobe T, Tischhauser E. Towards practical whitebox cryptography: optimizing efficiency and space hardness. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2016. 126–158
Xu T, Liu F, Wu C K. A white-box AES-like implementation based on key-dependent substitution-linear transformations. Multimed Tools Appl, 2017, doi: 10.1007/s11042-017-4562-8
Delerablée C, Lepoint T, Paillier P, et al. White-box security notions for symmetric encryption schemes. In: Proceedings of International Conference on Selected Areas in Cryptography. Berlin: Springer, 2013. 247–264
Acknowledgements
This work was supported by National Key R&D Program of China (Grant No. 2016YFB0800100), CAS Strategic Priority Research Program (Grant No. XDA06010701), and National Natural Science Foundation of China (Grant No. 61671448).
Author information
Authors and Affiliations
Corresponding authors
Additional information
The authors declare that they have no conflict of interest.
Supporting information Appendixes A and B. The supporting information is available online at info. scichina.com and link.springer.com. The supporting materials are published as submitted, without type-setting or editing. The responsibility for scientific accuracy and content remains entirely with the authors.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Xu, T., Wu, C., Liu, F. et al. Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci. China Inf. Sci. 61, 039103 (2018). https://doi.org/10.1007/s11432-016-9171-6
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-016-9171-6