{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:17:44Z","timestamp":1769721464564,"version":"3.49.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030648367","type":"print"},{"value":"9783030648374","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64837-4_8","type":"book-chapter","created":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T16:02:55Z","timestamp":1607184175000},"page":"221-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Security Reductions for White-Box Key-Storage in Mobile Payments"],"prefix":"10.1007","author":[{"given":"Estuardo","family":"Alpirez Bock","sequence":"first","affiliation":[]},{"given":"Chris","family":"Brzuska","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Janson","sequence":"additional","affiliation":[]},{"given":"Wil","family":"Michiels","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,6]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Alpirez Bock, E., et al.: White-box cryptography: don\u2019t forget about grey-box attacks. J. Cryptol. February 2019","DOI":"10.1007\/s00145-019-09315-1"},{"key":"8_CR2","unstructured":"Alpirez Bock, E., Brzuska, C., Fischlin, M., Janson, C., Michiels, W.: Security reductions for white-box key-storage in mobile payments. Cryptology ePrint Archive, Report 2019\/1014 (2019). https:\/\/eprint.iacr.org\/2019\/1014"},{"key":"8_CR3","unstructured":"Android Developers. Build. Class Documentation, Last retrieved: October 2018. https:\/\/developer.android.com\/reference\/android\/os\/Build"},{"key":"8_CR4","unstructured":"Android Developers. Keystore. Class Documentation, Last retrieved: October 2018. https:\/\/developer.android.com\/reference\/java\/security\/KeyStore"},{"key":"8_CR5","unstructured":"Android Developers. Telephony manager. Class Documentation, Last retrieved: October 2018. https:\/\/developer.android.com\/reference\/android\/telephony\/TelephonyManager"},{"key":"8_CR6","unstructured":"Apon, D. Huang, Y., Katz, J., Malozemoff, A.J.: Implementing cryptographic program obfuscation. Cryptology ePrint Archive, Report 2014\/779 (2014). http:\/\/eprint.iacr.org\/2014\/779"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Avoine, G., et al.: Security of distance-bounding: a survey. ACM Comput. Surv. 51(5), 94:1\u201394:33 (2019)","DOI":"10.1145\/3264628"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"307","DOI":"10.46586\/tosc.v2017.i1.307-328","volume":"2017","author":"S Banik","year":"2017","unstructured":"Banik, S., Bogdanov, A., Isobe, T., Jepsen, M.B.: Analysis of software countermeasures for whitebox encryption. IACR Trans. Symm. Cryptol. 2017(1), 307\u2013328 (2017)","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/3-540-44448-3_41","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531\u2013545. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44448-3_41"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1007\/978-3-662-49896-5_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"M Bellare","year":"2016","unstructured":"Bellare, M., Stepanovs, I., Waters, B.: New negative results on differing-inputs obfuscation. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 792\u2013821. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_28"},{"key":"8_CR11","series-title":"Part I, volume 8873 of LNCS","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-45611-8_4","volume-title":"ASIACRYPT 2014","author":"A Biryukov","year":"2014","unstructured":"Biryukov, A., Bouillaguet, C., Khovratovich, D.: Cryptographic schemes based on the ASASA structure: black-box, white-box, and public-key (extended abstract). In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. Part I, volume 8873 of LNCS, pp. 63\u201384. Springer, Heidelberg (2014)"},{"key":"8_CR12","series-title":"pp","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-39814-3_8","volume-title":"Management and Security in the Age of Hyperconnectivity","author":"T Bocek","year":"2016","unstructured":"Bocek, T., Killer, C., Tsiaras, C., Stiller, B.: An nfc relay attack with off-the-shelf hardware and software. In: Badonnel, R., Koch, R., Pras, A., Dra\u0161ar, M., Stiller, B. (eds.) Management and Security in the Age of Hyperconnectivity. pp, pp. 71\u201383. Springer, Cham (2016)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-12612-4_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2019","author":"E Alpirez Bock","year":"2019","unstructured":"Alpirez Bock, E., Amadori, A., Bos, J.W., Brzuska, C., Michiels, W.: Doubly half-injective prgs for incompressible white-box cryptography. In: Matsui, M. (ed.) CT-RSA 2019. LNCS, vol. 11405, pp. 189\u2013209. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12612-4_10"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Bock, E.A., Amadori, A., Brzuska, C., Michiels, W.: On the security goals of white-box cryptography. IACR TCHES, 2020(2), 327\u2013357 (2020). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8554","DOI":"10.46586\/tches.v2020.i2.327-357"},{"key":"8_CR15","first-page":"1058","volume-title":"ACM CCS 2015","author":"A Bogdanov","year":"2015","unstructured":"Bogdanov, A., Isobe, T.: White-box cryptography revisited: space-hard ciphers. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015, pp. 1058\u20131069. ACM Press, Oct. (2015)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-662-53887-6_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"A Bogdanov","year":"2016","unstructured":"Bogdanov, A., Isobe, T., Tischhauser, E.: Towards practical whitebox cryptography: optimizing efficiency and space hardness. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 126\u2013158. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_5"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-42045-0_15","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"D Boneh","year":"2013","unstructured":"Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 280\u2013300. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42045-0_15"},{"key":"8_CR18","series-title":"LNCS","first-page":"250","volume-title":"SAC 2002","author":"S Chow","year":"2003","unstructured":"Chow, S., Eisen, P.A., Johnson, H., van Oorschot, P.C.: White-box cryptography and an AES implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 250\u2013270. Springer, Heidelberg (2003)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Chow, S., et al.: A white-box DES implementation for DRM applications. In: Feigenbaum, J. (ed.) Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, vol. 2696, LNCS, pp. 1\u201315. Springer (2003)","DOI":"10.1007\/978-3-540-44993-5_1"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Cooijmans, T., de Ruiter, J., Poll, E.: Analysis of secure key storage solutions on android. In Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & #38; Mobile Devices, SPSM 2014, pp. 11\u201320. ACM (2014)","DOI":"10.1145\/2666620.2666627"},{"key":"8_CR21","unstructured":"cybercrypt. Ches 2019 capture the flag challenge - the whibox contest - edition 2 (2019). https:\/\/www.cyber-crypt.com\/whibox-contest\/"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-662-43414-7_13","volume-title":"Selected Areas in Cryptography \u2013 SAC 2013","author":"C Delerabl\u00e9e","year":"2014","unstructured":"Delerabl\u00e9e, C., Lepoint, T., Paillier, P., Rivain, M.: White-box security notions for symmetric encryption schemes. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 247\u2013264. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43414-7_13"},{"key":"8_CR23","unstructured":"ECRYPT. Ches 2017 capture the flag challenge - the whibox contest (2017). https:\/\/whibox.cr.yp.to\/"},{"key":"8_CR24","unstructured":"EMVCo. Emv mobile payment: Software-based mobile payment security requirements (2019). https:\/\/www.emvco.com\/wp-content\/uploads\/documents\/EMVCo-SBMP-16-G01-V1.2_SBMP_Security_Requirements.pdf"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-662-53887-6_6","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"P-A Fouque","year":"2016","unstructured":"Fouque, P.-A., Karpman, P., Kirchner, P., Minaud, B.: Efficient and provable white-box primitives. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 159\u2013188. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_6"},{"key":"8_CR26","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical relay attack on contactless transactions by using NFC mobile phones. Cryptology ePrint Archive, Report 2011\/618 (2011). http:\/\/eprint.iacr.org\/2011\/618"},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s13389-019-00207-5","volume":"10","author":"L Goubin","year":"2019","unstructured":"Goubin, L., Paillier, P., Rivain, M., Wang, J.: How to reveal the secrets of an obscure white-box implementation. J. Cryptographic Eng. 10(1), 49\u201366 (2019). https:\/\/doi.org\/10.1007\/s13389-019-00207-5","journal-title":"J. Cryptographic Eng."},{"key":"8_CR28","unstructured":"Hancke, G.: A practical relay attack on ISO 14443 proximity cards. Technical report (2005)"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_34"},{"key":"8_CR30","series-title":"LNCS","first-page":"106","volume-title":"CT-RSA 2020","author":"J Kwon","year":"2020","unstructured":"Kwon, J., Lee, B., Lee, J., Moon, D.: FPL: white-box secure block cipher using parallel table look-ups. In: Jarecki, S. (ed.) CT-RSA 2020. LNCS, vol. 12006, pp. 106\u2013128. Springer, Heidelberg (2020)"},{"key":"8_CR31","unstructured":"Mastercard. Mastercard mobile payment sdk (2017). https:\/\/developer.mastercard.com\/media\/32\/b3\/b6a8b4134e50bfe53590c128085e\/mastercard-mobile-payment-sdk-security-guide-v2.0.pdf"},{"key":"8_CR32","unstructured":"Rivain, M.: White-box cryptography. Presentation CARDIS 2017 (2017). http:\/\/www.matthieurivain.com\/files\/slides-cardis17.pdf"},{"key":"8_CR33","first-page":"98","volume-title":"ACM CCS 2002","author":"P Rogaway","year":"2002","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: Atluri, V. (ed.) ACM CCS 2002, pp. 98\u2013107. ACM Press, New York (2002)"},{"key":"8_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-540-25937-4_22","volume-title":"Fast Software Encryption","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 348\u2013358. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25937-4_22"},{"key":"8_CR35","first-page":"475","volume-title":"46th ACM STOC","author":"A Sahai","year":"2014","unstructured":"Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: Shmoys, D.B. (ed.) 46th ACM STOC, pp. 475\u2013484. ACM Press, New York (2014)"},{"key":"8_CR36","unstructured":"Sanfelix, E., de Haas, J., Mune, C.: Unboxing the white-box: Practical attacks against obfuscated ciphers. Presentation at BlackHat Europe 2015, (2015). https:\/\/www.blackhat.com\/eu-15\/briefings.html"},{"key":"8_CR37","unstructured":"Smart Card Alliance Mobile and NFC Council. Host card emulation 101. white paper (2014). http:\/\/www.smartcardalliance.org\/downloads\/HCE-101-WP-FINAL-081114-clean.pdf"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Wyseur, B.: White-box cryptography: Hiding keys in software (2012). http:\/\/www.whiteboxcrypto.com\/research.php","DOI":"10.1007\/978-1-4419-5906-5_627"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64837-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:28:08Z","timestamp":1710354488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64837-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030648367","9783030648374"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64837-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daejeon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"websubrev","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"316","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference will take place virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}