White-box cryptography: don’t forget about grey-box attacks E Alpirez Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ... Journal of Cryptology 32, 1095-1143, 2019 | 30 | 2019 |
On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography E Alpirez Bock, C Brzuska, W Michiels, A Treff Applied Cryptography and Network Security: 16th International Conference …, 2018 | 24 | 2018 |
On the security goals of white-box cryptography EA Bock, A Amadori, C Brzuska, W Michiels IACR transactions on cryptographic hardware and embedded systems, 327-357, 2020 | 22 | 2020 |
Inherent resistance of efficient ECC designs against SCA attacks Z Dyka, EA Bock, I Kabin, P Langendoerfer 2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016 | 20 | 2016 |
Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization E Alpirez Bock, Z Dyka, P Langendoerfer Innovative Security Solutions for Information Technology and Communications …, 2016 | 16 | 2016 |
Security reductions for white-box key-storage in mobile payments E Alpirez Bock, C Brzuska, M Fischlin, C Janson, W Michiels Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 12 | 2020 |
Doubly half-injective PRGs for incompressible white-box cryptography E Alpirez Bock, A Amadori, JW Bos, C Brzuska, W Michiels Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019 | 10 | 2019 |
Vulnerability assessment of an IHP ECC implementation EA Bock, Z Dyka | 6 | 2015 |
Security assessment of white-box design submissions of the CHES 2017 CTF challenge E Alpirez Bock, A Treff Constructive Side-Channel Analysis and Secure Design: 11th International …, 2021 | 5 | 2021 |
SCA resistent implementation of the Montgomery kP-algorithm EA Bock BTU Cottbus-Senftenberg, 2015 | 5 | 2015 |
White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation S Agrawal, EA Bock, Y Chen, G Watson Cryptology ePrint Archive, 2021 | 2* | 2021 |
SCA resistent implementation of the Montgomery kP-algorithm E Alpirez Bock BTU Cottbus-Senftenberg, 2015 | 2 | 2015 |
Protecting the most significant bits in scalar multiplication algorithms E Alpirez Bock, L Chmielewski, K Miteloudi Security, Privacy, and Applied Cryptography Engineering: 12th International …, 2022 | | 2022 |
On the Foundations of White-Box Cryptography EA Bock Aalto University, 2020 | | 2020 |
Vulnerability Assessment of an IHP ECC Implementation:(technical Report) EA Bock, Z Dyka BTU, 2015 | | 2015 |
Vulnerability assessment of an IHP ECC implementation E Alpírez Bock Deutsche Nationalbibliothek, 0 | | |
Discussing the Initialization of the Montgomery kP-Algorithm in the Light of SCA EA Bock, Z Dyka, P Langendoerfer | | |