Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography

  • 36 Accesses

This is a preview of subscription content, log in to check access.

References

  1. 1

    Chow S, Eisen P, Johnson H, et al. White-box cryptography and an AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2003. 250–270

  2. 2

    Billet O, Gilbert H, Ech-Chatbi C. Cryptanalysis of a white box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2005. 227–240

  3. 3

    Xu T, Wu C K, Liu F, et al. Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci China Inf Sci, 2018, 61: 039103

  4. 4

    Biryukov A, Shamir A. Structural cryptanalysis of SASAS. In: Proceedings of Eurocrypt 2001. Berlin: Springer, 2001. 395–405

  5. 5

    Baek C H, Cheon J H, Hong H. White-box AES implementation revisited. J Commun Netw, 2016, 18: 273–287

  6. 6

    Lepoint T, Rivain M, de Mulder Y, et al. Two attacks on a white-box AES implementation. In: Proceedings of International Workshop on Selected Areas in Cryptography. Berlin: Springer, 2014. 265–285

Download references

Author information

Correspondence to Yongjin Yeom.

Supplementary File

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Yeom, Y., Kim, D., Baek, C.H. et al. Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography. Sci. China Inf. Sci. 63, 139106 (2020). https://doi.org/10.1007/s11432-019-9883-9

Download citation