New Higher-Order Differential Computation Analysis on Masked White-Box AES
![]() |
Lee, Yechan
(Graduate School of Information Security and Institute of Cyber Security & Privacy (ICSP), Korea University)
Jin, Sunghyun (Graduate School of Information Security and Institute of Cyber Security & Privacy (ICSP), Korea University) Kim, Hanbit (Graduate School of Information Security and Institute of Cyber Security & Privacy (ICSP), Korea University) Kim, HeeSeok (Department of Cyber Security, College of Science and Technology, Korea University) Hong, Seokhie (Graduate School of Information Security and Institute of Cyber Security & Privacy (ICSP), Korea University) |
1 | Kocher, P., Jaffe, J., Jun, B.: "Differential Power Analysis," In: Wiener, M. (ed.) CRYPTO 1999. Aug. 1999, LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999) |
2 | Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: "White-box cryptography and an AES implementation," In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. Feb. 2003, LNCS, vol. 2595, pp. 250-270. Springer, Heidelberg (2003) (to appear) |
3 | Bos, J.W., Hubain, C., Michiels, W., Teuwen, P.: Differential computation analysis: hiding your white-box designs is not enough. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. Aug. 2016, LNCS, vol. 9813, pp. 215-236. Springer, Heidelberg (2016). doi: 10.1007/978-3-662-53140-2_11 |
4 | S. Lee, T. Kim, and Y. Kang, "A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis", in IEEE transaction on information forensics and security, vol. 13, no. 10, 2018, pp. 2602-2615. Apr. 2018. DOI |
5 | Brier E., Clavier C., Olivier F. (2004) "Correlation Power Analysis with a Leakage Model." In: Joye M., Quisquater JJ. (eds) Cryptographic Hardware and Embedded Systems - CHES 2004. Lecture Notes in Computer Science, vol 3156. pp. 16-29, Springer, Berlin, Heidelberg |
6 | Chow S., Eisen P., Johnson H., van Oorschot P.C. (2003) "A White-Box DES Implementation for DRM Applications." In: Feigenbaum J. (eds) Digital Rights Management. DRM 2002. Lecture Notes in Computer Science, vol 2696. Springer, Berlin, Heidelberg, pp. 1-15. |
7 | Billet O., Gilbert H., Ech-Chatbi C. (2004) "Cryptanalysis of a White Box AES Implementation." In: Handschuh H., Hasan M.A. (eds) Selected Areas in Cryptography. SAC 2004. Lecture Notes in Computer Science, vol 3357. Springer, Berlin, Heidelberg, pp. 227-240. |
8 | Dinur I. (2018) "An Improved Affine Equivalence Algorithm for Random Permutations." In: Nielsen J., Rijmen V. (eds) Advances in Cryptology -EUROCRYPT 2018. EUROCRYPT 2018. Lecture Notes in Computer Science, vol 10820. Springer, Cham. pp. 413-442. |
9 | C. H. Baek, J. H. Cheon and H. Hong, "White-box AES implementation revisited," in Journal of Communications and Networks, vol. 18, no. 3, pp. 273-287, June 2016. DOI |
10 | Sasdrich P., Moradi A., Guneysu T. (2016) White-Box Cryptography in the Gray Box. In: Peyrin T. (eds) Fast Software Encryption. FSE 2016. Lecture Notes in Computer Science, vol 9783. Springer, Berlin, Heidelberg, pp. 185-203. |
11 | Bogdanov A., Rivain M., Vejre P.S., Wang J. (2019) Higher-Order DCA against Standard Side-Channel Countermeasures. In: Polian I., Stottinger M. (eds) Constructive Side-Channel Analysis and Secure Design. COSADE 2019. Lecture Notes in Computer Science, vol 11421. Springer, Cham. pp. 118-141. |
12 |
Saarinen MJ.O. (2012) Cryptographic Analysis of All 4 |
![]() |