2014
DOI: 10.3724/sp.j.1001.2013.04356
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Attack to White-Box SMS4 Implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 0 publications
0
15
0
Order By: Relevance
“…WBAES were badly broken, the Xiao–Lai WBSM4 is also vulnerable. Lin and Lai extended the Billet et al . techniques and broke the Xiao–Lai WBSM4.…”
Section: Related Workmentioning
confidence: 93%
See 1 more Smart Citation
“…WBAES were badly broken, the Xiao–Lai WBSM4 is also vulnerable. Lin and Lai extended the Billet et al . techniques and broke the Xiao–Lai WBSM4.…”
Section: Related Workmentioning
confidence: 93%
“…The BGE attack recovers the round key by detecting affine equivalences, and the Lin–Lai attack also relies on the Billet et al . techniques to recover the linear encodings.…”
Section: Security Analysismentioning
confidence: 99%
“…Furthermore, the linear transformation , i n L is implemented by multiplying a composition of a series of matrices given by (23).…”
Section: Threat Models and The Crux Of Secure Implementationsmentioning
confidence: 99%
“…Because there are there are 8 2 ! possible constructions for each S-Box, the work factor of a attack follows the idea of [23] would be about 8 2 ! times higher break than the normal white-box SMS4 in Section 3.…”
mentioning
confidence: 99%
See 1 more Smart Citation