A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough
[chapter]
2016
Lecture Notes in Computer Science
Although all current scientific white-box approaches of standardized cryptographic primitives are broken, there is still a large number of companies which sell "secure" white-box products. In this paper a new approach to assess the security of white-box implementations is presented which requires neither knowledge about the look-up tables used nor any reverse engineering effort. This differential computation analysis (DCA) attack is the software counterpart of the differential power analysis
doi:10.1007/978-3-662-53140-2_11
fatcat:vchh5a4ddnh2hfwvioakgehwz4