### BART PRENEEL THESIS

On the Impossibility of Obfuscation with Auxiliary Input. Obfuscation for Cryptographic Purposes. Wee [Wee05] presented a provably secure obfuscator for a point function, which can be exploited in practice to construct authentication functionalities. Indeed, it does not suffice to only protect an application against extraction of embedded secret keys. Wyseur, and Bart Preneel:

A security notion is a formal description of the security of a cryptographic scheme. For example, a scheme is defined CPA-secure if an attacker cannot compute the plaintext from a given ciphertext, or KR-secure when the secret key cannot be recovered. Wyseur, and Bart Preneel: Resources Slides March — slides PhD defense. On Obfuscating Point Functions.

The main difference between code obfuscation and white-box cryptography is that the security of the latter needs to be validated with respect to security notions. A security notion is a formal description of the security of a cryptographic scheme. Positive Results and Techniques for Obfuscation.

## Whiteboxcrypto

Shafi Goldwasser and Yael Tauman Kalai. It makes sense to define white-box cryptography accordingly since it reflects more reality.

On the Im possibility of Obfuscating Programs. Tuesis, this result does not exclude the existence of secure code obfuscators: For example, to create the equivalent of a smart-card-based AES encryption function in software, it does not suffice that the white-box implementation resists extraction of its embedded key, but it yhesis also be hard to invert. Ran Canetti and Mayank Varia. For example, a scheme is defined CPA-secure if an attacker cannot compute the plaintext from a given ciphertext, or KR-secure when the secret key cannot be recovered.

# Bart Preneel | SBA Research

Resources Slides March — slides PhD defense. Indeed, it does not suffice to only protect an application against extraction of embedded secret keys. White-box implementations and cryptanalysis results A selection of the state of the art: Similar theoretic approaches have been conceived for white-box thesiss in [Sax09]. ITCC 1pages Obfuscation for Cryptographic Purposes.

Theoretic research on code obfuscation gained momentum with the seminal paper of Barak et al. Both have received similar scepticism on its feasibility and lack of theoretic foundations.

Wyseur, and Bart Preneel: On Obfuscating Point Functions. ppreneel

Research Academic research in white-box cryptography can be categorized into three activities. Jan 13, version: Theory White-box cryptography is often linked with code obfuscation, since both aim to protect software implementations.

Attacking an obfuscated cipher by injecting faults.

# White-box cryptography

Wee [Wee05] presented a provably secure obfuscator for a point function, which can be exploited in practice to construct authentication baart.

Chand Gupta, and G.

On the Impossibility of Obfuscation with Auxiliary Input.