{"id":"https://openalex.org/W4327888794","doi":"https://doi.org/10.13154/tches.v2020.i2.327-357","title":"On the Security Goals of White-Box Cryptography","display_name":"On the Security Goals of White-Box Cryptography","publication_year":2020,"publication_date":"2020-03-02","ids":{"openalex":"https://openalex.org/W4327888794","doi":"https://doi.org/10.13154/tches.v2020.i2.327-357"},"language":"en","primary_location":{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/102202","is_oa":true,"landing_page_url":"https://research.aalto.fi/en/publications/8a0d87a1-6f43-461f-b200-b3eab33fd2d1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.aalto.fi/en/publications/8a0d87a1-6f43-461f-b200-b3eab33fd2d1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063915665","display_name":"Estuardo Alp\u00edrez Bock","orcid":"https://orcid.org/0000-0002-8410-5488"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Alpirez Bock, Estuardo","raw_affiliation_strings":["Aalto University, Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University, Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028920298","display_name":"Alessandro Amadori","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Amadori, Alessandro","raw_affiliation_strings":["Technische Universiteit Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Technische Universiteit Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070858115","display_name":"Chris Brzuska","orcid":null},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Brzuska, Chris","raw_affiliation_strings":["Aalto University, Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University, Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087182298","display_name":"Wil Michiels","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]},{"id":"https://openalex.org/I109147379","display_name":"NXP (Netherlands)","ror":"https://ror.org/059be4e97","country_code":"NL","type":"company","lineage":["https://openalex.org/I109147379"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Michiels, Wil","raw_affiliation_strings":["Technische Universiteit Eindhoven, Netherlands;  NXP Semiconductors, Netherlands"],"affiliations":[{"raw_affiliation_string":"Technische Universiteit Eindhoven, Netherlands;  NXP Semiconductors, Netherlands","institution_ids":["https://openalex.org/I109147379","https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063915665"],"corresponding_institution_ids":["https://openalex.org/I9927081"],"apc_list":null,"apc_paid":null,"fwci":0.2744,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6765504,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6369976997375488},{"id":"https://openalex.org/keywords/white","display_name":"White (mutation)","score":0.5787004828453064},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46218597888946533},{"id":"https://openalex.org/keywords/white-paper","display_name":"White paper","score":0.44635966420173645},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44580307602882385},{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.4288296699523926},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.24553188681602478},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.11276829242706299},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07624632120132446},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.06844550371170044}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6369976997375488},{"id":"https://openalex.org/C56273599","wikidata":"https://www.wikidata.org/wiki/Q3122841","display_name":"White (mutation)","level":3,"score":0.5787004828453064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46218597888946533},{"id":"https://openalex.org/C2778605646","wikidata":"https://www.wikidata.org/wiki/Q223729","display_name":"White paper","level":2,"score":0.44635966420173645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44580307602882385},{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.4288296699523926},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.24553188681602478},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.11276829242706299},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07624632120132446},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.06844550371170044},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/102202","is_oa":true,"landing_page_url":"https://research.aalto.fi/en/publications/8a0d87a1-6f43-461f-b200-b3eab33fd2d1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},{"id":"pmh:oai:doaj.org/article:e0c4bca0c4454a3d80c9b0845c36ae62","is_oa":true,"landing_page_url":"https://doaj.org/article/e0c4bca0c4454a3d80c9b0845c36ae62","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)","raw_type":"article"},{"id":"doi:10.13154/tches.v2020.i2.327-357","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tches.v2020.i2.327-357","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/102202","is_oa":true,"landing_page_url":"https://research.aalto.fi/en/publications/8a0d87a1-6f43-461f-b200-b3eab33fd2d1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2039483111","https://openalex.org/W2184303792","https://openalex.org/W616705313","https://openalex.org/W2171811465","https://openalex.org/W1985490921","https://openalex.org/W4386235169","https://openalex.org/W2060145807","https://openalex.org/W2492325008","https://openalex.org/W4248806346","https://openalex.org/W2120580112"],"abstract_inverted_index":{"We":[0,51],"discuss":[1,53],"existing":[2],"and":[3,10,19,59,178,203],"new":[4,44],"security":[5,45,55,70],"notions":[6],"for":[7,15,36,77,155],"white-box":[8,28,37,83,88,117,133,153,201,206],"cryptography":[9,38],"comment":[11],"on":[12,73],"their":[13],"suitability":[14],"Digital":[16],"Rights":[17],"Management":[18],"Mobile":[20],"Payment":[21],"Applications,":[22],"the":[23,54,61,131,168,189,194,199,204],"two":[24],"prevalent":[25],"use-cases":[26],"of":[27,57],"cryptography.":[29],"In":[30,171],"particular,":[31,172],"we":[32,48,79,119,216],"put":[33],"forward":[34],"indistinguishability":[35,145],"with":[39],"hardware-binding":[40,100],"(IND-WHW)":[41],"as":[42,67,144,215],"a":[43,68,81,102,183],"notion":[46,76],"that":[47,121],"deem":[49],"central.":[50],"also":[52,208],"property":[56],"application-binding":[58],"explain":[60,217],"issues":[62],"faced":[63],"when":[64],"defining":[65],"it":[66],"formal":[69],"notion.":[71],"Based":[72],"our":[74,160],"proposed":[75,93],"hardware-binding,":[78],"describe":[80],"possible":[82],"competition":[84,94],"setup":[85,95],"which":[86],"assesses":[87],"implementations":[89,154],"w.r.t.":[90],"hardware-binding.":[91,138],"Our":[92],"allows":[96],"us":[97],"to":[98,114,150,167],"capture":[99],"in":[101,130,188,218],"practically":[103,211],"meaningful":[104],"way.":[105],"While":[106],"some":[107],"symmetric":[108,125],"encryption":[109,126],"schemes":[110,127],"have":[111],"been":[112],"proven":[113],"admit":[115],"plain":[116,132,200],"implementations,":[118],"show":[120],"not":[122,164],"all":[123],"secure":[124,152],"are":[128],"white-boxeable":[129],"attack":[134,213],"scenario,":[135],"i.e.,":[136],"without":[137],"Thus,":[139],"even":[140],"strong":[141],"assumptions":[142],"such":[143],"obfuscation":[146],"cannot":[147],"be":[148],"used":[149],"provide":[151],"arbitrary":[156],"ciphers.":[157],"Perhaps":[158],"surprisingly,":[159],"impossibility":[161],"result":[162,187],"does":[163],"carry":[165],"over":[166],"hardware-bound":[169,190,205],"scenario.":[170],"Alpirez":[173],"Bock,":[174],"Brzuska,":[175],"Fischlin,":[176],"Janson":[177],"Michiels":[179],"(ePrint":[180],"2019/1014)":[181],"proved":[182],"rather":[184],"general":[185],"feasibility":[186],"model.":[191],"Equally":[192],"important,":[193],"apparent":[195],"theoretical":[196],"distinction":[197],"between":[198],"model":[202,207],"translates":[209],"into":[210],"reduced":[212],"capabilities":[214],"this":[219],"paper.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2023-03-21T00:00:00"}
