과제정보
This work was partly supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No. 2020R1F1A1061107), Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P0008703, The Competency Development Program for Industry Specialist), and the MSIT under the ICT Challenge and Advanced Network of HRD (ICAN) program (No. IITP-2022-RS-2022-00156310) supervised by the Institute of Information & Communication Technology Planning & Evaluation (IITP).
참고문헌
- S. K. Lee and Y. S. Kang, "Principles and Statistical Analysis of White Box Ciphers," IITP Weekly ICT Trends, vol. 1977, pp. 15-25, Dec. 2020.
- S. Chow, P. Eisen, H. Johnson, and P. C. V. Oorschot, "White-Box Cryptography and an AES Implementation," in Proceedings of International Workshop on Selected Areas in Cryptography, Berlin, Heidelberg, pp. 250-270, 2003.
- Y. Xiao and X. Lai, "A Secure Implementation of White-Box AES," in Proceedings of 2009 2nd International Conference on Computer Science and its Applications, Jeju, Korea, pp. 1-6, 2009.
- S. Lee, T. Kim, and Y. Kang, "A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis," IEEE Transactions on Information Forensics and Security, vol. 13, no. 10, pp. 2602-2615, Oct. 2018. https://doi.org/10.1109/TIFS.2018.2825939
- S. M. Cho, and S. H. Seo, "Current status of cryptographic technology applied to drone security," Review of Korea Institute of Information Security and Cryptology, vol.30, no. 2, pp.11-19. Apr. 2020.
- D. H. Choi and C. K. Hong, "A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment," Journal of Convergence for Information Technology, vol. 9, no. 10, pp. 9-15, Oct. 2019. https://doi.org/10.22156/CS4SMB.2019.9.10.009
- S. -V. Ghita, V. -V. Patriciu, and I. Bica, "A new DRM architecture based on mobilel code and white-box encryption," in Proceedings of 2012 9th International Conference on Communications, Bucharest, Romania, pp. 303-306, 2012.
- S. H. Kim, Y. K Lee, and B. H. Chung, "Analysis on Trends for White-Box Cryptography and Its Application Technology," Electronics and Telecommunications Trends, vol. 25, no. 5, pp. 137-146, Oct. 2010. https://doi.org/10.22648/ETRI.2010.J.250512
- Y. C. Lee, S. H. Jin, H. V. Kim, H. S. Kim, and S. H. Hong, "New Higher-Order Differential Computation Analysis on Masked White-Box AES," Journal of The Korea Institute of Information Security and Cryptology, vol. 30, no. 1, pp. 1-15, Feb. 2020. https://doi.org/10.13089/JKIISC.2020.30.1.1
- D. G. V. Albricci, M. Ceria, F. Cioschi, N. Fornari, A. Shakiba, and A. Visconti, "Measuring Performances of a White-Box Approach in the IoT Context," Symmetry, vol. 11, no. 8, pp. 1-19, Aug. 2019.
- A. Saha and C. Srinivasan, "White-Box cryptography based data encryption-decryption scheme for IoT environment," in Proceedings of 2019 5th International Conference on Advanced Computing &Communication Systems, Coimbatore, India, pp. 637-641, 2019.
- Y. Shi, W. Wei, H. Fan, M. H. Au, and X. Luo, "A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices," IEEE Transactions on Computers, vol. 68, no. 10, pp. 1411-1427, Oct. 2011.
- L. Zhou, C. Su, Y. Wen, W. Li, and Z. Gong, "Towards practical white-box lightweight block cipher implementations for IoTs," Future Generation Computer Systems, vol. 86, no. 507-514, Sep. 2018.
- K. Kapusta, G. Memmi, and H. Noura, "Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks," Annals of Telecommunications, vol. 74, no. 3-4, pp. 157-165, Apr. 2019. https://doi.org/10.1007/s12243-018-0684-x
- doegox. Deadpool [Internet]. Available: https://github.com/SideChannelMarvels/Deadpool.