{"id":"https://openalex.org/W4294325988","doi":"https://doi.org/10.46586/tches.v2022.i4.527-552","title":"ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge","display_name":"ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge","publication_year":2022,"publication_date":"2022-08-31","ids":{"openalex":"https://openalex.org/W4294325988","doi":"https://doi.org/10.46586/tches.v2022.i4.527-552"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2022.i4.527-552","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i4.527-552","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9830/9334","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/9830/9334","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050380536","display_name":"Guillaume Barbu","orcid":"https://orcid.org/0000-0001-9740-8966"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Guillaume Barbu","raw_affiliation_strings":["IDEMIA, Cryptography & Security Labs, Pessac, France"],"affiliations":[{"raw_affiliation_string":"IDEMIA, Cryptography & Security Labs, Pessac, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065941145","display_name":"Ward Beullens","orcid":"https://orcid.org/0000-0003-0888-283X"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Ward Beullens","raw_affiliation_strings":["IBM Research, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014550311","display_name":"Emmanuelle Dottax","orcid":"https://orcid.org/0000-0001-8717-3462"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Emmanuelle Dottax","raw_affiliation_strings":["IDEMIA, Cryptography & Security Labs, Pessac, France"],"affiliations":[{"raw_affiliation_string":"IDEMIA, Cryptography & Security Labs, Pessac, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034963776","display_name":"Christophe Giraud","orcid":"https://orcid.org/0000-0003-4414-1852"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christophe Giraud","raw_affiliation_strings":["IDEMIA, Cryptography & Security Labs, Pessac, France"],"affiliations":[{"raw_affiliation_string":"IDEMIA, Cryptography & Security Labs, Pessac, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038826365","display_name":"Agathe Houzelot","orcid":"https://orcid.org/0000-0001-7051-7097"},"institutions":[{"id":"https://openalex.org/I15057530","display_name":"Universit\u00e9 de Bordeaux","ror":"https://ror.org/057qpr032","country_code":"FR","type":"education","lineage":["https://openalex.org/I15057530"]},{"id":"https://openalex.org/I4210142254","display_name":"Laboratoire Bordelais de Recherche en Informatique","ror":"https://ror.org/03adqg323","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I15057530","https://openalex.org/I4210142254","https://openalex.org/I4210159245","https://openalex.org/I4210160189"]},{"id":"https://openalex.org/I4210160189","display_name":"Institut Polytechnique de Bordeaux","ror":"https://ror.org/054qv7y42","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210160189"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Agathe Houzelot","raw_affiliation_strings":["IDEMIA, Cryptography & Security Labs, Pessac, France; LaBRI, CNRS, Universit\u00e9 de Bordeaux, Bordeaux, France","LaBRI, CNRS, Universit\u00e9 de Bordeaux, Bordeaux, France","IDEMIA, Cryptography & Security Labs, Pessac, France"],"affiliations":[{"raw_affiliation_string":"IDEMIA, Cryptography & Security Labs, Pessac, France; LaBRI, CNRS, Universit\u00e9 de Bordeaux, Bordeaux, France","institution_ids":["https://openalex.org/I15057530","https://openalex.org/I1294671590","https://openalex.org/I4210142254"]},{"raw_affiliation_string":"LaBRI, CNRS, Universit\u00e9 de Bordeaux, Bordeaux, France","institution_ids":["https://openalex.org/I15057530","https://openalex.org/I4210142254","https://openalex.org/I4210160189","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"IDEMIA, Cryptography & Security Labs, Pessac, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030695669","display_name":"Chaoyun Li","orcid":"https://orcid.org/0000-0001-9917-3419"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Chaoyun Li","raw_affiliation_strings":["imec-COSIC, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-COSIC, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027577077","display_name":"Mohammad Mahzoun","orcid":"https://orcid.org/0000-0002-9204-8719"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Mohammad Mahzoun","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025900248","display_name":"Adri\u00e1n Ranea","orcid":"https://orcid.org/0000-0002-8697-7423"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Adri\u00e1n Ranea","raw_affiliation_strings":["imec-COSIC, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-COSIC, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089514365","display_name":"Jianrui Xie","orcid":"https://orcid.org/0000-0002-4178-9920"},"institutions":[{"id":"https://openalex.org/I4210114974","display_name":"IMEC","ror":"https://ror.org/02kcbn207","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I4210114974"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Jianrui Xie","raw_affiliation_strings":["imec-COSIC, KU Leuven, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-COSIC, KU Leuven, Leuven, Belgium","institution_ids":["https://openalex.org/I4210114974","https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5050380536"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8332,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77790208,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"527","last_page":"552"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.8267585039138794},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7723078727722168},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.7008768320083618},{"id":"https://openalex.org/keywords/contest","display_name":"CONTEST","score":0.6078622937202454},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5690670013427734},{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.4760327637195587},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43662557005882263},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2835965156555176},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2600668966770172},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.152387797832489},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.08642467856407166}],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.8267585039138794},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7723078727722168},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.7008768320083618},{"id":"https://openalex.org/C2777582232","wikidata":"https://www.wikidata.org/wiki/Q5013414","display_name":"CONTEST","level":2,"score":0.6078622937202454},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5690670013427734},{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.4760327637195587},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43662557005882263},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2835965156555176},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2600668966770172},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.152387797832489},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.08642467856407166},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.46586/tches.v2022.i4.527-552","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i4.527-552","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9830/9334","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:pure.tue.nl:openaire/ca4085ca-13f8-42d0-a128-b750142056d1","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/ca4085ca-13f8-42d0-a128-b750142056d1","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Barbu, G, Beullens, W, Dottax, E, Giraud, C, Houzelot, A, Li, C, Mahzoun, M, Ranea, A & Xie, J 2022, 'ECDSA White-Box Implementations : Attacks and Designs from CHES 2021 Challenge', IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2022, no. 4, pp. 527-552. https://doi.org/10.46586/tches.v2022.i4.527-552","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/705444","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/bitstream/20.500.12942/705444/2/published%20whibox%20ECDSA.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2022 (4), (527-552)","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:43d36a18c3b34b5fbf27b9369cf3f982","is_oa":true,"landing_page_url":"https://doaj.org/article/43d36a18c3b34b5fbf27b9369cf3f982","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)","raw_type":"article"},{"id":"pmh:oai:doaj.org/article:fc31da682f684074b35f7d2e1ae9a5d7","is_oa":true,"landing_page_url":"https://doaj.org/article/fc31da682f684074b35f7d2e1ae9a5d7","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)","raw_type":"article"},{"id":"pmh:tue:oai:pure.tue.nl:publications/ca4085ca-13f8-42d0-a128-b750142056d1","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/ca4085ca-13f8-42d0-a128-b750142056d1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(4), 527 - 552. Ruhr-University Bochum","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2022.i4.527-552","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i4.527-552","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9830/9334","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4399999976158142}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321730","display_name":"Fonds Wetenschappelijk Onderzoek","ror":"https://ror.org/03qtxy027"},{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4294325988.pdf","grobid_xml":"https://content.openalex.org/works/W4294325988.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W11078255","https://openalex.org/W60689211","https://openalex.org/W940457550","https://openalex.org/W1411375199","https://openalex.org/W1490121172","https://openalex.org/W1505973206","https://openalex.org/W1551163711","https://openalex.org/W1551572898","https://openalex.org/W1572375309","https://openalex.org/W1580599221","https://openalex.org/W1595979964","https://openalex.org/W1607187538","https://openalex.org/W1846793529","https://openalex.org/W1917830443","https://openalex.org/W1935672779","https://openalex.org/W1938099525","https://openalex.org/W2069196751","https://openalex.org/W2110697240","https://openalex.org/W2124167991","https://openalex.org/W2140514778","https://openalex.org/W2184904104","https://openalex.org/W2234839359","https://openalex.org/W2621279043","https://openalex.org/W2814895833","https://openalex.org/W2893337833","https://openalex.org/W2919040637","https://openalex.org/W2979371882","https://openalex.org/W2999372069","https://openalex.org/W3013440967","https://openalex.org/W3082349452","https://openalex.org/W3096664316","https://openalex.org/W3135037544","https://openalex.org/W3209227426","https://openalex.org/W4226070370","https://openalex.org/W4236403289","https://openalex.org/W4242592426","https://openalex.org/W4300349690","https://openalex.org/W4312298187"],"related_works":["https://openalex.org/W1964111820","https://openalex.org/W1485630101","https://openalex.org/W2083338789","https://openalex.org/W2277923899","https://openalex.org/W1501086624","https://openalex.org/W2112690207","https://openalex.org/W2741796204","https://openalex.org/W1596157658","https://openalex.org/W4244853187","https://openalex.org/W4294325988"],"abstract_inverted_index":{"Despite":[0],"the":[1,16,37,55,81,85,90,96,105,111,114,120,126,158,191],"growing":[2],"demand":[3],"for":[4,184],"software":[5],"implementations":[6,50],"of":[7,15,98,100,113,133,135],"ECDSA":[8,22,48,127,156],"secure":[9],"against":[10,103],"attackers":[11,52,60],"with":[12,141],"full":[13],"control":[14],"execution":[17],"environment,":[18],"scientific":[19],"literature":[20],"on":[21],"white-box":[23,49,159],"design":[24],"is":[25,161],"scarce.":[26],"The":[27],"CHES":[28],"2021":[29],"WhibOx":[30,150],"contest":[31,151],"was":[32],"thus":[33],"held":[34],"to":[35,46,53,68],"assess":[36],"state-of-the-art":[38],"and":[39,51,63,73,93,144,148,164,187],"encourage":[40],"relevant":[41],"practical":[42],"research,":[43,186],"inviting":[44],"developers":[45],"submit":[47],"break":[54],"corresponding":[56],"submissions.In":[57],"this":[58,77,176],"work,":[59],"(team":[61,65],"TheRealIdefix)":[62],"designers":[64],"zerokey)":[66],"join":[67],"describe":[69,110],"several":[70],"attack":[71],"techniques":[72],"designs":[74,112,124,179],"used":[75,83],"during":[76],"contest.":[78],"We":[79],"explain":[80],"methods":[82,102],"by":[84,119,130],"team":[86,121],"TheRealIdefix,":[87],"which":[88,138],"broke":[89],"most":[91],"challenges,":[92],"we":[94,109],"show":[95],"efficiency":[97],"each":[99],"these":[101,123],"all":[104],"submitted":[106,118],"implementations.":[107],"Moreover,":[108],"two":[115,173],"winning":[116],"challenges":[117],"zerokey;":[122],"represent":[125],"signature":[128],"algorithm":[129],"a":[131,181],"sequence":[132],"systems":[134],"low-degree":[136],"equations,":[137],"are":[139],"obfuscated":[140],"affine":[142],"encodings":[143],"extra":[145],"random":[146],"variables":[147],"equations.The":[149],"has":[152],"shown":[153],"that":[154],"securing":[155],"in":[157],"model":[160],"an":[162],"open":[163],"challenging":[165],"problem,":[166],"as":[167],"no":[168],"implementation":[169],"survived":[170],"more":[171],"than":[172],"days.":[174],"In":[175],"context,":[177],"our":[178,188],"provide":[180],"starting":[182],"methodology":[183],"further":[185],"attacks":[189],"highlight":[190],"weak":[192],"points":[193],"future":[194],"work":[195],"should":[196],"address.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
