{"id":"https://openalex.org/W3012983724","doi":"https://doi.org/10.1109/access.2020.2993651","title":"Improvement on a Masked White-Box Cryptographic Implementation","display_name":"Improvement on a Masked White-Box Cryptographic Implementation","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3012983724","doi":"https://doi.org/10.1109/access.2020.2993651","mag":"3012983724"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2993651","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2993651","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09091057.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09091057.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083938393","display_name":"Seungkwang Lee","orcid":"https://orcid.org/0000-0001-9534-9624"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seungkwang Lee","raw_affiliation_strings":["Department of School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101610666","display_name":"Myungchul Kim","orcid":"https://orcid.org/0000-0001-8077-0053"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Myungchul Kim","raw_affiliation_strings":["Department of School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083938393"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.2719,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62691185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"90992","last_page":"91004"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.810407280921936},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6556123495101929},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.6349090337753296},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.6164653301239014},{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.5732741355895996},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.5492461323738098},{"id":"https://openalex.org/keywords/lookup-table","display_name":"Lookup table","score":0.5235119462013245},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4704369902610779},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3666907548904419},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3164934515953064},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2545017600059509},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19258829951286316},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1646171510219574}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.810407280921936},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6556123495101929},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.6349090337753296},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.6164653301239014},{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.5732741355895996},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.5492461323738098},{"id":"https://openalex.org/C134835016","wikidata":"https://www.wikidata.org/wiki/Q690265","display_name":"Lookup table","level":2,"score":0.5235119462013245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4704369902610779},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3666907548904419},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3164934515953064},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2545017600059509},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19258829951286316},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1646171510219574},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.2993651","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2993651","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09091057.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"mag:3012983724","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2020/199.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null},{"id":"pmh:oai:doaj.org/article:c8943d00df204f4c97a6ab35aea74487","is_oa":true,"landing_page_url":"https://doaj.org/article/c8943d00df204f4c97a6ab35aea74487","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 90992-91004 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2993651","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2993651","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09091057.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3692524881","display_name":null,"funder_award_id":"2018-0-00230","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G6072120315","display_name":null,"funder_award_id":"funded","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"},{"id":"https://openalex.org/G7685055460","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"}],"funders":[{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3012983724.pdf","grobid_xml":"https://content.openalex.org/works/W3012983724.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W130371449","https://openalex.org/W1572375309","https://openalex.org/W1595979964","https://openalex.org/W1897761346","https://openalex.org/W1917830443","https://openalex.org/W2140514778","https://openalex.org/W2155938490","https://openalex.org/W2234839359","https://openalex.org/W2284679654","https://openalex.org/W2491381336","https://openalex.org/W2775907218","https://openalex.org/W2784274257","https://openalex.org/W2794489645","https://openalex.org/W2798267696","https://openalex.org/W2898641991","https://openalex.org/W2921892480","https://openalex.org/W3011269793","https://openalex.org/W4236403289","https://openalex.org/W4240744236","https://openalex.org/W6630318109","https://openalex.org/W6630605577","https://openalex.org/W6632933420","https://openalex.org/W6634150308","https://openalex.org/W6638737612","https://openalex.org/W6640536031","https://openalex.org/W6682554491","https://openalex.org/W6761563772"],"related_works":["https://openalex.org/W3024909990","https://openalex.org/W2919040637","https://openalex.org/W2798267696","https://openalex.org/W2794489645","https://openalex.org/W2594881615","https://openalex.org/W2150261140","https://openalex.org/W1572375309","https://openalex.org/W2286671212","https://openalex.org/W2921892480","https://openalex.org/W2510546925","https://openalex.org/W2789890652","https://openalex.org/W2013637019","https://openalex.org/W2050152162","https://openalex.org/W2491381336","https://openalex.org/W3214586009","https://openalex.org/W3169039957","https://openalex.org/W2116497491","https://openalex.org/W2784274257","https://openalex.org/W2952320066","https://openalex.org/W1472434837"],"abstract_inverted_index":{"White-box":[0],"cryptography":[1,114],"is":[2,91],"a":[3,52,60,117,135,179],"software":[4],"technique":[5,63,143],"to":[6,18,27,49,119,144,204],"protect":[7,120,172],"secret":[8,41],"keys":[9,42],"of":[10,23,31,98,158,201],"cryptographic":[11,45],"algorithms":[12],"from":[13,43],"attackers":[14],"who":[15],"have":[16],"access":[17],"memory.":[19],"By":[20],"adapting":[21],"techniques":[22],"differential":[24],"power":[25],"analysis":[26,162],"computation":[28],"traces":[29],"consisting":[30],"runtime":[32],"information,":[33],"Differential":[34],"Computation":[35],"Analysis":[36],"(DCA)":[37],"has":[38],"recovered":[39],"the":[40,67,70,77,92,96,102,111,126,141,145,150,159,168,193,199,205],"white-box":[44,54,104,113,136],"implementations.":[46],"In":[47,106],"order":[48],"thwart":[50],"DCA,":[51],"masked":[53,103,112,207],"implementation":[55,139],"was":[56,59,80],"suggested.":[57],"It":[58],"customized":[61],"masking":[62,142],"that":[64,167],"randomizes":[65],"all":[66],"values":[68],"in":[69,115],"lookup":[71],"tables":[72],"with":[73,129,178],"different":[74],"masks.":[75,131],"However,":[76],"round":[78,127],"output":[79,128],"only":[81],"permuted":[82],"by":[83,88,124,155],"byte":[84],"encodings,":[85],"not":[86],"protected":[87],"masking.":[89],"This":[90,187],"main":[93],"reason":[94],"behind":[95],"success":[97],"DCA":[99,122,174,177],"variants":[100,123,175],"on":[101],"implementation.":[105],"this":[107],"paper,":[108],"we":[109,133],"improve":[110],"such":[116],"way":[118],"against":[121,173],"obfuscating":[125],"random":[130],"Specifically,":[132],"introduce":[134],"AES":[137],"(WB-AES)":[138],"applying":[140],"key-dependent":[146],"intermediate":[147],"value":[148],"and":[149,163,184,196],"several":[151],"outer-round":[152],"outputs":[153],"computed":[154],"partial":[156],"bits":[157],"key.":[160],"Our":[161],"experimental":[164],"results":[165],"show":[166],"proposed":[169],"WB-AES":[170],"can":[171],"including":[176],"2-byte":[180],"key":[181],"guess,":[182],"collision,":[183],"bucketing":[185],"attacks.":[186],"work":[188],"requires":[189],"approximately":[190],"3.7":[191],"times":[192,198],"table":[194],"size":[195],"0.7":[197],"number":[200],"lookups":[202],"compared":[203],"previous":[206],"WB-AES.":[208]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
