Follow
Estuardo Alpírez Bock
Estuardo Alpírez Bock
Verified email at aalto.fi - Homepage
Title
Cited by
Cited by
Year
White-box cryptography: don’t forget about grey-box attacks
E Alpirez Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ...
Journal of Cryptology 32, 1095-1143, 2019
472019
On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography
E Alpirez Bock, C Brzuska, W Michiels, A Treff
Applied Cryptography and Network Security: 16th International Conference …, 2018
382018
On the security goals of white-box cryptography
EA Bock, A Amadori, C Brzuska, W Michiels
IACR transactions on cryptographic hardware and embedded systems, 327-357, 2020
372020
Security reductions for white-box key-storage in mobile payments
E Alpirez Bock, C Brzuska, M Fischlin, C Janson, W Michiels
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
242020
Inherent resistance of efficient ECC designs against SCA attacks
Z Dyka, EA Bock, I Kabin, P Langendoerfer
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
212016
Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization
E Alpirez Bock, Z Dyka, P Langendoerfer
International Conference for Information Technology and Communications, 167-178, 2016
172016
Doubly half-injective PRGs for incompressible white-box cryptography
E Alpirez Bock, A Amadori, JW Bos, C Brzuska, W Michiels
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
142019
Breaking dpa-protected kyber via the pair-pointwise multiplication
EA Bock, G Banegas, C Brzuska, Ł Chmielewski, K Puniamurthy, M Šorf
International Conference on Applied Cryptography and Network Security, 101-130, 2024
92024
Security assessment of white-box design submissions of the CHES 2017 CTF challenge
E Alpirez Bock, A Treff
Constructive Side-Channel Analysis and Secure Design: 11th International …, 2021
82021
White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation
S Agrawal, E Alpírez Bock, Y Chen, G Watson
International Workshop on Constructive Side-Channel Analysis and Secure …, 2023
7*2023
On the influence of hardware technologies on the vulnerability of protected ECC implementations
I Kabin, EA Bock, C Wittke, D Kreiser, Z Dyka, P Langendoerfer
Proc. of the DSD (Work in progress Session), 2016
72016
SCA resistent implementation of the Montgomery kP-algorithm
EA Bock
BTU Cottbus-Senftenberg, 2015
72015
Vulnerability assessment of an IHP ECC implementation
EA Bock, Z Dyka
62015
SCA resistent implementation of the Montgomery kP-algorithm
E Alpirez Bock
BTU Cottbus-Senftenberg, 2015
22015
Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators
E Alpirez Bock, C Brzuska, RWF Lai
International Association for Cryptologic Research, 2024
2024
Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators
EA Bock, C Brzuska, RWF Lai
IACR Communications in Cryptology 1 (2), 2024
2024
Adaptive Distributional Security for Garbling Schemes with Online Complexity
EA Bock, C Brzuska, P Karanko, S Oechsner, K Puniamurthy
Cryptology ePrint Archive, 2024
2024
Adaptive Distributional Security for Garbling Schemes with  Online Complexity
EA Bock, C Brzuska, P Karanko, S Oechsner, K Puniamurthy
International Conference on the Theory and Application of Cryptology and …, 2023
2023
On Provable White-Box Security in the Strong Incompressibility Model
EA Bock, C Brzuska, RWF Lai
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023
2023
Systems And Methods For Whitebox Device Binding
S Agrawal, EA Bock, C Yilei, GJ Watson
US Patent App. 17/907,919, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20