Protecting white-box cryptographic implementations with obfuscated round boundaries.
Tao XuChuankun WuFeng LiuRuoxin ZhaoPublished in: Sci. China Inf. Sci. (2018)
Keyphrases
- white box
- black box
- source code
- random number generators
- reverse engineering
- smart card
- s box
- test cases
- efficient implementation
- block cipher
- source code metrics
- test data
- object boundaries
- hash functions
- active contours
- encryption key
- software projects
- public key cryptography
- privacy preservation
- data sets
- access control
- image segmentation