A white-box speck implementation using self-equivalence encodings (full version)
J Vandersmissen, A Ranea, B Preneel - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In 2002, Chow et al. initiated the formal study of white-box cryptography and introduced the
CEJO framework. Since then, various white-box designs based on their framework have
been proposed, all of them broken. Ranea and Preneel proposed a different method in
2020, called self-equivalence encodings and analyzed its security for AES. In this paper, we
apply this method to generate the first academic white-box Speck implementations using self-
equivalence encodings. Although we focus on Speck in this work, our design could easily be …
CEJO framework. Since then, various white-box designs based on their framework have
been proposed, all of them broken. Ranea and Preneel proposed a different method in
2020, called self-equivalence encodings and analyzed its security for AES. In this paper, we
apply this method to generate the first academic white-box Speck implementations using self-
equivalence encodings. Although we focus on Speck in this work, our design could easily be …
A white-box speck implementation using self-equivalence encodings
J Vandersmissen, A Ranea, B Preneel - International Conference on …, 2022 - Springer
In 2002, Chow et al. initiated the formal study of white-box cryptography and introduced the
CEJO framework. Since then, various white-box designs based on their framework have
been proposed, all of them broken. Ranea and Preneel proposed a different method in
2020, called self-equivalence encodings and analyzed its security for AES. In this paper, we
apply this method to generate the first academic white-box speck implementations using self-
equivalence encodings. Although we focus on speck in this work, our design could easily be …
CEJO framework. Since then, various white-box designs based on their framework have
been proposed, all of them broken. Ranea and Preneel proposed a different method in
2020, called self-equivalence encodings and analyzed its security for AES. In this paper, we
apply this method to generate the first academic white-box speck implementations using self-
equivalence encodings. Although we focus on speck in this work, our design could easily be …
Showing the best results for this search. See all results