A Secure and Efficient White-Box Implementation of SM4
Differential Computation Analysis (DCA) leverages memory traces to extract secret keys, bypassing countermeasures employed in white-box designs, such as encodings. Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficienc...
Saved in:
| Main Authors: | Xiaobo Hu, Yanyan Yu, Yinzi Tu, Jing Wang, Shi Chen, Yuqi Bao, Tengyuan Zhang, Yaowen Xing, Shihui Zheng |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-12-01
|
| Series: | Entropy |
| Subjects: | |
| Online Access: | https://www.mdpi.com/1099-4300/27/1/1 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Power analysis attack of HMAC based on SM3
by: Zhi-bo DU, et al.
Published: (2016-05-01) -
Review of algebraic attacks on stream ciphers
by: ZHANG Long1, et al.
Published: (2006-01-01) -
Mutual information power analysis attack of HMAC based on SM3
by: Zhen WU, et al.
Published: (2016-10-01) -
Stealthy Vehicle Adversarial Camouflage Texture Generation Based on Neural Style Transfer
by: Wei Cai, et al.
Published: (2024-10-01) -
A New S-Box Design by Applying Bat Algorithm Based Technique
by: Maiya Din, et al.
Published: (2023-08-01)