Conventional encryption algorithms are designed to be secure in the "black-box" context, i.e. the attacker has access to the input and output of the algorithm, but cannot observe the intermediate values generated during the software execution. Yet in some cases, the encryption algorithm runs in a hostile environment, where the attacker can see not only the input and output values but also has full access to all the internal values and can change the execution at will.
oai:arar.sci.am:258886
ՀՀ ԳԱԱ Հիմնարար գիտական գրադարան
Dec 8, 2023
Jul 24, 2020
12
https://arar.sci.am/publication/282015
Edition name | Date |
---|---|
Review of White-box Implementations of AES Block Cipher and Known Attacks | Dec 8, 2023 |
Seda N. Manukian
Vahan V. Gevorgyan Gevorg A. Karapetyan Hakob G. Sarukhanyan
Davit A. Grigoryan
Hrachya V. Astsatryan Edita E. Gichunts