Skip to content

White box AES literature

Philippe Teuwen edited this page May 4, 2017 · 6 revisions

White-box cryptography and an AES implementation Stanley Chow, Phil Eisen, Harold Johnson, and Paul C. Van Oorschot, in Proceedings of the Ninth Workshop on Selected Areas in Cryptography (SAC 2002, pages 250–270. Springer-Verlag, 2002.

Cryptanalysis of a white box AES implementation Olivier Billet, Henri Gilbert, and Charaf Ech-Chatbi, in Proceedings of the 11th international conference on Selected Areas in Cryptography, SAC’04, pages 227–240, Berlin, Heidelberg, 2005. Springer-Verlag. ISBN 3-540-24327-5, 978-3-540-24327-4. doi: 10.1007/978-3-540-30564-4_16.

Mechanism for software tamper resistance: an application of white-box cryptography Wil Michiels and Paul Gorissen, in Proceedings of the 2007 ACM workshop on Digital Rights Management, DRM ’07, pages 82–89, New York, NY, USA, 2007. ACM. ISBN 978-1-59593-884-8. doi: 10.1145/1314276.1314291. URL http://doi.acm.org/10.1145/1314276.1314291.

A secure implementation of white-box AES Yaying Xiao and Xuejia Lai, in Computer Science and its Applications, 2009. CSA ’09. 2nd International Conference on, pages 1–6, 2009. doi: 10.1109/CSA.2009.5404239.

Cryptanalysis of the Xiao-Lai white-box AES implementation Yoni De Mulder, Peter Roelse, and Bart Preneel, in Lars R. Knudsen and Huapeng Wu, editors, Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, pages 34–49. Springer, 2012. ISBN 978-3-642-35999-6. URL http://dblp.uni-trier.de/db/conf/sacrypt/sacrypt2012.html#MulderRP12.

White box cryptography: Another attempt. Julien Bringer, Hervé Chabanne, and Emmanuelle Dottax, IACR Cryptology ePrint Archive, 2006:468, 2006. URL http://dblp.uni-trier.de/db/journals/iacr/iacr2006.html#BringerCD06a.

Cryptanalysis of a perturbated white-box AES implementation Yoni De Mulder, Brecht Wyseur, and Bart Preneel, in Guang Gong and Kishan Chand Gupta, editors, INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, pages 292–310. Springer, 2010. ISBN 978-3-642-17400-1. URL http://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2010.html#MulderWP10.

Protecting white-box AES with dual ciphers Mohamed Karroumi, in Proceedings of the 13th international conference on Information security and cryptology, ICISC’10, pages 278–291, Berlin, Heidelberg, 2011. Springer-Verlag. ISBN 978-3-642-24208-3. URL http://link.springer.com/chapter/10.1007%2F978-3-642-24209-0_19.

White-box attack resistant cryptography Dušan Klinec, Diploma thesis, Brno, 2013

Two attacks on a white-box AES implementation Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, and Bart Preneel, in Lange et al. [LLL13].

Another Nail in the Coffin of White-Box AES Implementations Tancrède Lepoint and Matthieu Rivain, https://eprint.iacr.org/2013/455

Analytic Toolbox for White-Box Implementations: Limitation and Perspectives aka White-Box AES Implementation Revisited Chung Hun Baek and Jung Hee Cheon and Hyunsook Hong, https://eprint.iacr.org/2014/688

Revisiting the BGE Attack on a White-Box AES Implementation Yoni De Mulder and Peter Roelse and Bart Preneel

A Tutorial on White-box AES James A. Muir, https://eprint.iacr.org/2013/104

A new attempt of white-box AES implementation Rui Luo, Xuejia Lai, and Rong You, in Security, Pattern Analysis, and Cybernetics (SPAC), 2014 International Conference on. IEEE, 2014