메뉴 건너뛰기




Volumn 2016-January, Issue , 2016, Pages 16-29

An ultra-lightweight white-box encryption scheme for securing resource-constrained loT devices

Author keywords

Internet of things; Resource constrained; Ultra lightweight; White box attack context; White box encryption scheme

Indexed keywords

INTERNET OF THINGS; SECURITY OF DATA; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 85020028228     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2991079.2991086     Document Type: Conference Paper
Times cited : (27)

References (59)
  • 2
    • 38148998967 scopus 로고    scopus 로고
    • Cryptanalysis of patarin's 2-round public key system with s boxes (2r)
    • 2000/01/01 2000, Springer Berlin Heidelberg
    • Biham, E., 2000. Cryptanalysis of patarin's 2-round public key system with s boxes (2r). In Proceedings of the Advances in Cryptology - EUROCRYPT 2000 2000/01/01 2000, Springer Berlin Heidelberg, 408-416.
    • (2000) Proceedings of the Advances in Cryptology - EUROCRYPT 2000 , pp. 408-416
    • Biham, E.1
  • 4
    • 84916624473 scopus 로고    scopus 로고
    • Cryptographic schemes based on the asasa structure: Black-box, white-box, and public-key
    • 2014/01/01 2014, Springer Berlin Heidelberg
    • Biryukov, A., Bouillaguet, C, and Khovratovich, D., 2014. Cryptographic schemes based on the asasa structure: black-box, white-box, and public-key In Proceedings of the Advances in Cryptology - ASIACRYPT 2014 2014/01/01 2014, Springer Berlin Heidelberg, 63-84.
    • (2014) Proceedings of the Advances in Cryptology - ASIACRYPT 2014 , pp. 63-84
    • Biryukov, A.1    Bouillaguet, C.2    Khovratovich, D.3
  • 6
    • 84961573666 scopus 로고    scopus 로고
    • Cryptanalysis of feistel networks with secret round functions
    • Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers 2015, Springer International Publishing
    • Biryukov, A., Leurent, G., and Perrin, L., 2015. Cryptanalysis of feistel networks with secret round functions. In Proceedings of the Selected Areas in Cryptography-SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers 2015, Springer International Publishing.
    • (2015) Proceedings of the Selected Areas in Cryptography-SAC 2015, 21st International Conference
    • Biryukov, A.1    Leurent, G.2    Perrin, L.3
  • 7
    • 84943592011 scopus 로고    scopus 로고
    • On reverse-engineering s-boxes with hidden design criteria or structure
    • 2015/01/01 2015, Springer Berlin Heidelberg
    • Biryukov, A. and Perrin, L.,2015. On reverse-engineering s-boxes with hidden design criteria or structure. In Proceedings of the Advances in Cryptology - CRYPTO 2015 2015/01/01 2015, Springer Berlin Heidelberg, 116-140.
    • (2015) Proceedings of the Advances in Cryptology - CRYPTO 2015 , pp. 116-140
    • Biryukov, A.1    Perrin, L.2
  • 8
    • 77956748277 scopus 로고    scopus 로고
    • Structural cryptanalysis ofsasas
    • (2010/10/01)
    • Biryukov, A. and Shamir, A., 2010. Structural cryptanalysis ofsasas. Journal of Cryptology 23, 4 (2010/10/01), 505-518.
    • (2010) Journal of Cryptology , vol.23 , Issue.4 , pp. 505-518
    • Biryukov, A.1    Shamir, A.2
  • 15
    • 84872510835 scopus 로고    scopus 로고
    • Cryptanalysis of the xiao - Lai white-box aes implementation
    • 2013/01/01 2013, Springer Berlin Heidelberg
    • De Mulder, Y., Roelse, P., and Preneel, B., 2013. Cryptanalysis of the xiao - lai white-box aes implementation. In Proceedings of the Selected Areas in Cryptography 2013/01/01 2013, Springer Berlin Heidelberg, 34-49.
    • (2013) Proceedings of the Selected Areas in Cryptography , pp. 34-49
    • De Mulder, Y.1    Roelse, P.2    Preneel, B.3
  • 23
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • G. VIGNA Ed. Springer Berlin Heidelberg
    • Hohl, F., 1998. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile agents and security, G. VIGNA Ed. Springer Berlin Heidelberg, 92-113.
    • (1998) Mobile Agents and Security , pp. 92-113
    • Hohl, F.1
  • 27
    • 84904107418 scopus 로고    scopus 로고
    • Sweet dreams and nightmares: Security in the internet of things
    • D. NACCACHE and D. SAUVERON Eds. Springer-Verlag Berlin, Berlin
    • Kasper, T., Oswald, D., and Paar, C, 2014. Sweet dreams and nightmares: Security in the internet of things. In Information Security Theory and Practice: Securing the Internet of Things, D. NACCACHE and D. SAUVERON Eds. Springer-Verlag Berlin, Berlin, 1-9.
    • (2014) Information Security Theory and Practice: Securing the Internet of Things , pp. 1-9
    • Kasper, T.1    Oswald, D.2    Paar, C.3
  • 28
    • 84922876788 scopus 로고    scopus 로고
    • Social access vs. Privacy in wearable computing: A case study of autism
    • Kirkham, R. and Greenhalgh, C, 2015. Social access vs. Privacy in wearable computing: A case study of autism. Pervasive Computing, IEEE 14, 1, 26-33.
    • (2015) Pervasive Computing, IEEE , vol.14 , Issue.1 , pp. 26-33
    • Kirkham, R.1    Greenhalgh, C.2
  • 35
    • 84904263520 scopus 로고    scopus 로고
    • Survey on vanet security challenges and possible cryptographic solutions
    • Mejri, M.N., Ben-Othman, J., and Hamdi, M., 2014. Survey on vanet security challenges and possible cryptographic solutions. Vehicular Communications 1, 2 (4//), 53-66.
    • (2014) Vehicular Communications , vol.1-2 , Issue.4 , pp. 53-66
    • Mejri, M.N.1    Ben-Othman, J.2    Hamdi, M.3
  • 39
    • 84907912876 scopus 로고    scopus 로고
    • Node-capture resilient key establishment in sensor networks: Design space and new protocols
    • Newell, A., Yao, H, Ryker, A., Ho, T., and Nita-Rotaru, C, 2014. Node-capture resilient key establishment in sensor networks: Design space and new protocols.ACM Comput. Surv. 47,2, 1-34.
    • (2014) ACM Comput. Surv. , vol.47 , Issue.2 , pp. 1-34
    • Newell, A.1    Yao, H.2    Ryker, A.3    Ho, T.4    Nita-Rotaru, C.5
  • 40
    • 84946837966 scopus 로고    scopus 로고
    • Generic attacks on feistel schemes
    • 2001/01/01 2001, Springer Berlin Heidelberg
    • Patarin, J., 2001. Generic attacks on feistel schemes. In Proceedings of the Advances in Cryptology - AS/ACRYPT 2001 2001/01/01 2001, Springer Berlin Heidelberg, 222-238.
    • (2001) Proceedings of the Advances in Cryptology - AS/ACRYPT 2001 , pp. 222-238
    • Patarin, J.1
  • 41
    • 0010537086 scopus 로고    scopus 로고
    • Asymmetric cryptography with s-boxes is it easier than expected to design efficient asymmetric cryptosystems?
    • Patarin, J. and Goubin, L., 1997. Asymmetric cryptography with s-boxes is it easier than expected to design efficient asymmetric cryptosystems? In Proceedings of the Information and Communications Security 1991, 369-380.
    • (1997) Proceedings of the Information and Communications Security 1991 , pp. 369-380
    • Patarin, J.1    Goubin, L.2
  • 42
    • 85132926942 scopus 로고    scopus 로고
    • Security and privacy in vehicular ad-hoc networks: Survey and the road ahead
    • S. KHAN and A.-S. KHAN PATHAN Eds. Springer Berlin Heidelberg
    • Razzaque, M.A., S, A., and Cheraghi, S., 2013. Security and privacy in vehicular ad-hoc networks: Survey and the road ahead. In Wireless networks and security, S. KHAN and A.-S. KHAN PATHAN Eds. Springer Berlin Heidelberg, 107-132.
    • (2013) Wireless Networks and Security , pp. 107-132
    • Razzaque, M.A.1    Cheraghi, S.2
  • 43
    • 84954315402 scopus 로고    scopus 로고
    • How close are we to realizing a pragmatic vanet solution? A meta-survey
    • Saini, M., Alelaiwi, A., and Saddik, A.E., 2015. How close are we to realizing a pragmatic vanet solution? A meta-survey.ACM Comput. Surv. 48, 2, 1-40.
    • (2015) ACM Comput. Surv. , vol.48 , Issue.2 , pp. 1-40
    • Saini, M.1    Alelaiwi, A.2    Saddik, A.E.3
  • 44
  • 47
    • 84890077179 scopus 로고    scopus 로고
    • A secure implementation of a symmetric encryption algorithm in white-box attack contexts
    • Shi, Y., Liu, Q., and Zhao, Q.P., 2013. A secure implementation of a symmetric encryption algorithm in white-box attack contexts. Journal of Applied Mathematics.
    • (2013) Journal of Applied Mathematics
    • Shi, Y.1    Liu, Q.2    Zhao, Q.P.3
  • 48
    • 84930650129 scopus 로고    scopus 로고
    • A lightweight white-box symmetric encryption algorithm against node capture for wsns
    • Shi, Y., Wei, W., and He, Z., 2015. A lightweight white-box symmetric encryption algorithm against node capture for wsns. Sensors 15, 5, 11928.
    • (2015) Sensors , vol.15 , Issue.5 , pp. 11928
    • Shi, Y.1    Wei, W.2    He, Z.3
  • 49
    • 85029503707 scopus 로고    scopus 로고
    • Multiple protocol transport network gateway for iot systems
    • Shih, C.-S. and Wu, G.-F., 2016. Multiple protocol transport network gateway for iot systems.ACM S1GAPP Applied Computing Review 15, 4, 7-18.
    • (2016) ACM S1GAPP Applied Computing Review , vol.15 , Issue.4 , pp. 7-18
    • Shih, C.-S.1    Wu, G.-F.2
  • 51
    • 84904856750 scopus 로고    scopus 로고
    • Microcontrollers as (insecurity devices for pervasive computing applications
    • Strobel, D., Oswald, D., Richter, B., Schellenberg, F., and Paar, C, 2014. Microcontrollers as (insecurity devices for pervasive computing applications. Proceedings of the IEEE 102, 8, 1157-1173.
    • (2014) Proceedings of the IEEE , vol.102 , Issue.8 , pp. 1157-1173
    • Strobel, D.1    Oswald, D.2    Richter, B.3    Schellenberg, F.4    Paar, C.5
  • 52
    • 84912071950 scopus 로고    scopus 로고
    • A white-box clefia implementation for mobile devices
    • Institution of Engineering and Technology
    • Su, S., Dong, H, Fu, G., Zhang, C, and Zhang, M., 2014. A white-box clefia implementation for mobile devices. In 1ET Conference Proceedings Institution of Engineering and Technology, 27-27.
    • (2014) 1ET Conference Proceedings , pp. 27
    • Su, S.1    Dong, H.2    Fu, G.3    Zhang, C.4    Zhang, M.5
  • 53
    • 84890062304 scopus 로고    scopus 로고
    • Improved cryptanalysis of an aes implementation
    • Boekelo, The Netherlands, May 24-25, 2012 WIC (Werkgemeenschap voor Inform.-en Communicatietheorie)
    • Tolhuizen, L., 2012. Improved cryptanalysis of an aes implementation. In Proceedings of the 33rd W1C Symposium on /nformation Theory in the Benelux, Boekelo, The Netherlands, May 24-25, 2012 WIC (Werkgemeenschap voor Inform.-en Communicatietheorie).
    • (2012) Proceedings of the 33rd W1C Symposium on /Nformation Theory in the Benelux
    • Tolhuizen, L.1
  • 54
    • 84885349351 scopus 로고    scopus 로고
    • Efficient attack to white-box sms4 implementation
    • Tt, L. and Xj, L., 2013. Efficient attack to white-box sms4 implementation. Joumal of Software 24, 9, 2238-2249.
    • (2013) Joumal of Software , vol.24 , Issue.9 , pp. 2238-2249
    • Tt, L.1    Xj, L.2
  • 57
    • 84984964164 scopus 로고    scopus 로고
    • White-box cryptography and a white-box implementation of the sms4 algorithm
    • Xiao, Y. and Lai, X., 2009. White-box cryptography and a white-box implementation of the sms4 algorithm. In Proceedings of the Chaincrypto 2009 2009, 24-34.
    • (2009) Proceedings of the Chaincrypto 2009 , vol.2009 , pp. 24-34
    • Xiao, Y.1    Lai, X.2
  • 58
    • 84934275692 scopus 로고    scopus 로고
    • Security in vehicular ad hoc networks (vanets)
    • Springer Berlin Heidelberg
    • Yang, W.,2013. Security in vehicular ad hoc networks (vanets). In Wireless network security Springer Berlin Heidelberg, 95-128.
    • (2013) Wireless Network Security , pp. 95-128
    • Yang, W.1
  • 59
    • 84861459260 scopus 로고    scopus 로고
    • Exact formulae for resilience in random key predistribution schemes
    • (May)
    • Yum, D.H. and Lee, P.J., 2012. Exact formulae for resilience in random key predistribution schemes, Ieee Transactions on Wireless Communications 11,5 (May), 1638-1642.
    • (2012) Ieee Transactions on Wireless Communications , vol.11 , Issue.5 , pp. 1638-1642
    • Yum, D.H.1    Lee, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.