Voir la notice de l'article provenant de la source Math-Net.Ru
@article{UZERU_2016_1_a6, author = {D. H. Danoyan}, title = {Extending white-box cryptography based oblivious transfer protocol}, journal = {Proceedings of the Yerevan State University. Physical and mathematical sciences}, pages = {40--44}, publisher = {mathdoc}, number = {1}, year = {2016}, language = {en}, url = {http://geodesic.mathdoc.fr/item/UZERU_2016_1_a6/} }
TY - JOUR AU - D. H. Danoyan TI - Extending white-box cryptography based oblivious transfer protocol JO - Proceedings of the Yerevan State University. Physical and mathematical sciences PY - 2016 SP - 40 EP - 44 IS - 1 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/UZERU_2016_1_a6/ LA - en ID - UZERU_2016_1_a6 ER -
D. H. Danoyan. Extending white-box cryptography based oblivious transfer protocol. Proceedings of the Yerevan State University. Physical and mathematical sciences, no. 1 (2016), pp. 40-44. http://geodesic.mathdoc.fr/item/UZERU_2016_1_a6/
[1] S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, “White-Box Cryptography and an AES Implementation”, Selected Areas in Cryptography, Lecture Notes in Computer Science, 2595, 2003, 250–270 | DOI | MR | Zbl
[2] S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, “A White-Box Des Implementation for DRM Applications”, Digital Rights Management, Lecture Notes in Computer Science, 2696, 2003, 1–15 | DOI | Zbl
[3] H.E. Link, W.D. Neumann, “Clarifying Obfuscation: Improving the Security of White-Box DES”, Information Technology. “Coding and Computing, 2005”, 2005, 679–684
[4] O. Billet, H. Gilbert, C. Ech-Chatbi, “Cryptanalysis of a White Box Aes Implementation”, Selected Areas in Cryptography, Lecture Notes in Computer Science, 3357, 2004, 227–240 | DOI | MR
[5] B. Wyseur, W. Michiels, P. Gorissen, B. Preneel, “Cryptanalysis of White-Box Des Implementations with Arbitrary External Encodings”, Selected Areas in Cryptography, Lecture Notes in Computer Science, 2007, 264–277 | DOI | Zbl
[6] P. Eisen, G. Goodes, D.E. Murdock, System and Method for Generating White-Box Implementations of Software Applications, US Patent Application CA2724793 A1, 2009
[7] W. Michiels, P. Gorissen, Cryptographic Method for a White-Box Implementation, US Patent Application WO2008059420 A2, 2007
[8] A.J. Farrugia, B. Chevallier-Mames, B. Kindarji, M. Ciet, T. Icart, Cryptographic Process Execution Protecting an Input Value Against Attacks, US Patent Application US 8605894 B2, 2011
[9] M. Rabin, Tech. Memo TR-81, Aiken Computation Laboratory, Harvard U., 1981
[10] S. Even, O. Goldreich, A. Lempel, “A Randomized Protocol for Signing Contracts”, Communications of the ACM, 28:6 (1985), 637–647 | DOI | MR
[11] G. Brassard, C. Crepeau, J.-M. Robert, “All-Or-Nothing Disclosure of Secrets”, Advances in Cryptology–CRYPTO’86, 1986, 234–238 | MR
[12] Y. Lindell, B. Pinkas, “Secure Two-Party Computation Via Cut-and-Choose Oblivious Transfer”, Journal of Cryptology, 25:4 (2012), 680–722 | DOI | MR | Zbl
[13] M. Naor, B. Pinkas, Financial Cryptography Lecture Notes in Computer Science, Lecture Notes in Computer Science, 1962, 2001, 1–20 | DOI | MR | Zbl
[14] A. Jivanyan, G. Khachatryan, A. Oliynik, “Efficient Oblivious Transfer Protocols Based on White-Box Cryptography”, AUA Internal Reports, 2013
[15] D. Malkhi, N. Nisan, B. Pinkas, Y. Sella, “Fairplay – A Secure Two-Party Computation System.”, USENIX Security Symposium, v. 4, 2004
[16] A. Yao, “How to Generate and Exchange Secrets”, Foundations of Computer Science, 27th Annual Symposium, 1986, 162–167
[17] O. Goldreich, S. Micali, A. Wigderson, “How to Play any Mental Game”, Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, 1987, 218–229
[18] D. Beaver, “Correlated Pseudo-Randomness and the Complexity of Private Computations”, Proceedings of the 28th Annual ACM Symposium on Theory of Computing, 1996, 479–488 | MR | Zbl
[19] Y. Ishai, J. Kilian, K. Nissim, E. Petrank, “Extending Oblivious Transfers Efficiently”, Advances in Cryptology–CRYPTO’2003, 2003, 145–161 | MR | Zbl
[20] G. Asharov, Y. Lindell, T. Schneider, M. Zohner, “More Efficient Oblivious Transfer and Extensions for Faster Secure Computation”, Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013, 535–548
[21] V. Kolesnikov, R. Kumaresan, “Improved OT Extension for Transferring Short Secrets”, Advances in Cryptology–CRYPTO’2013, 2013, 54–70 | MR | Zbl