Follow
Estuardo Alpírez Bock
Estuardo Alpírez Bock
Verified email at aalto.fi - Homepage
Title
Cited by
Cited by
Year
White-box cryptography: don’t forget about grey-box attacks
E Alpirez Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ...
Journal of Cryptology 32, 1095-1143, 2019
412019
On the security goals of white-box cryptography
EA Bock, A Amadori, C Brzuska, W Michiels
IACR transactions on cryptographic hardware and embedded systems, 327-357, 2020
342020
On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography
E Alpirez Bock, C Brzuska, W Michiels, A Treff
Applied Cryptography and Network Security: 16th International Conference …, 2018
332018
Security reductions for white-box key-storage in mobile payments
E Alpirez Bock, C Brzuska, M Fischlin, C Janson, W Michiels
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
222020
Inherent resistance of efficient ECC designs against SCA attacks
Z Dyka, EA Bock, I Kabin, P Langendoerfer
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
222016
Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization
E Alpirez Bock, Z Dyka, P Langendoerfer
International Conference for Information Technology and Communications, 167-178, 2016
162016
Doubly half-injective PRGs for incompressible white-box cryptography
E Alpirez Bock, A Amadori, JW Bos, C Brzuska, W Michiels
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
122019
Security assessment of white-box design submissions of the CHES 2017 CTF challenge
E Alpirez Bock, A Treff
Constructive Side-Channel Analysis and Secure Design: 11th International …, 2021
82021
SCA resistent implementation of the Montgomery kP-algorithm
EA Bock
BTU Cottbus-Senftenberg, 2015
72015
Vulnerability assessment of an IHP ECC implementation
EA Bock, Z Dyka
72015
White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation
S Agrawal, E Alpírez Bock, Y Chen, G Watson
International Workshop on Constructive Side-Channel Analysis and Secure …, 2023
6*2023
Breaking DPA-protected Kyber via the pair-pointwise multiplication
EA Bock, G Banegas, C Brzuska, Ł Chmielewski, K Puniamurthy, M Šorf
Cryptology ePrint Archive, 2023
52023
SCA resistent implementation of the Montgomery kP-algorithm
E Alpirez Bock
BTU Cottbus-Senftenberg, 2015
22015
Adaptive Distributional Security for Garbling Schemes with Online Complexity
EA Bock, C Brzuska, P Karanko, S Oechsner, K Puniamurthy
Cryptology ePrint Archive, 2024
2024
Adaptive Distributional Security for Garbling Schemes with  Online Complexity
EA Bock, C Brzuska, P Karanko, S Oechsner, K Puniamurthy
International Conference on the Theory and Application of Cryptology and …, 2023
2023
On Provable White-Box Security in the Strong Incompressibility Model
EA Bock, C Brzuska, RWF Lai
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023
2023
Systems And Methods For Whitebox Device Binding
S Agrawal, EA Bock, C Yilei, GJ Watson
US Patent App. 17/907,919, 2023
2023
Protecting the most significant bits in scalar multiplication algorithms
E Alpirez Bock, L Chmielewski, K Miteloudi
International Conference on Security, Privacy, and Applied Cryptography …, 2022
2022
On the Foundations of White-Box Cryptography
EA Bock
Aalto University, 2020
2020
Vulnerability Assessment of an IHP ECC Implementation:(technical Report)
EA Bock, Z Dyka
BTU, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20